The Internet of Things - The Need for Standardisation
|
|
- Ellen Rodgers
- 6 years ago
- Views:
Transcription
1 NEKs Ekomkonferanse 21Nov2017, Oslo The Internet of Things - The Need for Standardisation Josef Noll Department of Technology Systems, University of Oslo m: , e: josef.noll@its.uio.no IoTSec.no - SCOTT.IoTSec.no
2 The last time I was connected by wire was at birth - our when Internet of Things (IoT) meets people! The changing role of security in HMS -> HMSS! Internet has changed, IoT will accelerate the ecosystem of making business automated processes! Security in IoT teach our sensors to talk Norwegian! Standardisation new paradigm: measurable security security classes design! related to projects: Security in IoT for Smart Grids: IoTSec.no Secure Trusted IoT: SCOTT.IoTSec.no, Diversity in IoT Security: DiversIoT.IoTSec.no Need for standardisation in IoT Nov2017, Josef Noll 2
3 Source: L. Atzori et al., The Internet of Things: A survey, Comput. Netw. (2010), doi: / The Internet of Things (IoT) Things! IoT = Things + Internet + Semantics! Things that communicate with Things: computer, understand the meaning, takes own decisions Internet Semantics * security * privacy * dependability * context-aware * personalised Smart Energy - Trust Jun2017, Josef Noll 3
4 IoT - 3rd wave of convergence 1. wave: All-IP By 2020, business is dominated by [DNV-GL 2013] automated processes flat world, global business all-ip 2. wave: Telecom - IT - Broadcast from fixed to mobile and quadruple play Telecom = mobile Telco-IT 3. wave: IoT Internet The business merger core business Community Collaboration and cooperation drives developments Need for standardisation in IoT IoT Internet Nov2017, Josef Noll 4
5 Economics in IoT Jun2017, Noll et al. 5
6 National initiative for a more secure future in IoT IoTSec.no - Security in IoT for Smart Grids Academia Industry Interest Org. Industry «Open World Approach» everything that is not declared closed is open Gjøvik Kjeller Oslo Halden International IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X
7 Addressing the Threat Dimension for IoT! Hollande (FR), Merkel (DE) had their mobile being monitored! «and we believe it is not happening in Norway? [source: Süddeutsche Zeitung, 18Dec2014] [source: Need for standardisation in IoT Nov2017, Josef Noll 6
8 I Significance 16Oct2016 IoT security challenges! Mirai attack security by obscurity different security viewpoint! it is just the beginning [Source: ] Need for standardisation in IoT Nov2017, Josef Noll 7
9 Communication & IoT for society project IoTSec.no >20 partners (5 academics) Research on IoT security Building the national Security Centre for Smart Meter Internet Smart Grid Security by obscurity Open World Approach IoTSec.no Feb 2016, Josef Noll 8
10 teach our sensors to talk Norwegian Need for standardisation in IoT Nov2017, Josef Noll 9
11 SCOTT key message elevator pitch largest security project in EU 57 largest partners security from project 12 countries in EU 80 M budget 35 M EU&national largest 8 partners security from project Norway in EU IoT is the game changer and driver for digitalisation, and SCOTT contributes through: Answer the IoT need for a new and more advanced security paradigm through security classes Create a Convincing privacy assessment through privacy labelling Automotive Home Rail 5G Establish a clear link between security and safety Avionics 10
12 The trust matrix! trust as a positive user attitude engaging voluntarily! security based trust issues building trusted systems! technological factors data storage, distribution insight! human/societal factors government family, friends Smart Energy - Trust Jun2017, Josef Noll 11
13 Learn from Industrial Automation and Mobile Networks! What to secure?! Network segregation Network slicing! From Confidentiality, Service cloud #1 Service cloud #2 Softwareenabled routing Home services Appliance services Integrity, Availability VPN #1 Car services (CIA)! to Availability, Integrity, Confidentiality (AIC) Basic Internet low capacity Health services Smart Energy - Trust Jun2017, Josef Noll X
14 Security in IoT - our promises Semantic system description Understanding the system and describing security through security functionality Measurable security - the novel security concept criticality Measurable criticality Security modelling Development of privacy-aware models and measures Adopting and enhancing adaptive security for system of systems Formal languages for semantically proving signalling ideal good accep. critical failure System versus Goal analysis Application-specific security/privacy, e.g. billing vs Human/technical interface, security usability to measurable: security, privacy and dependability Operational security for IoT-based critical infrastructure IoTSec ecosystem -> extended network Roadmap for Smart Grid Security Centre (SGSC) (Gap Analysis of security methods for critical infrastructures) IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X
15 Example of Research: Multi-Metricsv2 - system composition! System consists of sub-systems criticality consists of components security system (s,p,d) ideal good accep. critical failure privacy dependability Multi-Metrics (weighted subsystems) sub-system 1 sub-system 2 (s,p,d) (s,p,d) M MM Multi-Metrics Comp. 1 Comp. 2 Comp. 3 Innovation through IoT - IoTSec.no - BasicInternet.org Nov2016, Josef Noll X
16 High level view of Security in IoT Goal Provide the means for IoT security from todays attack to tomorrows design security thinking in organisations Trust in Things Privacy label Smart Grid Security Centre facilitated through: Security classes & System design Manish Adam Smart Grid Security Centre Accountable security: - Assessment - Modelling - Framework Habtamu Olaf Toktam Seraj - Meas. Security all Heidi Håkon Øivind Privacy Label Elahe our basis: Christian Security and Privacy Functionality Josef Elahe IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 12
17 Security and Privacy Functionality IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 13
18 Security Classes and System design Security Classes in IoT New postulate of security class Consequence Exposure Consequence Consequence as in risk map Exposure Security Class Physical exposure - people, building, physical ports, IT exposure - ports, firewall, connectivity Used to assess the security class Increase weak security: - watchdog - Attribute based access control (S-ABAC) Exposure of Systems, sub-systems and components IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 14
19 Semantic attribute based access control (S-ABAC) Lifting the security class through S- ABAC GSM/LTE Access to information who (sensor, person, service) Admin Cloud what kind of information from where Attribute-based access role (in organisation, home) Smart Home Access device, network security tokens Meter reading Home-logic home owner Rules inferring access rights Smart grid operator Power control statistical data Heat pump Warm water Attributes: roles, access, device, reputation, behaviour,... IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X
20 Methodology: From System description to SPD level System/ Sub-system Is made by Components and functionalities Could be SPD Components, SPD functionalities described by Metrics description (SPD functionality) define config. parameters and SPD values in Metrics Run SPD Multimetrics analysis System: Automatic Meter System (AMS) consists of reader (AMR), aggregator, communications, storage, user access Sub-systems: AMR consists of power monitor, processing unit, communication unit Component: AMR communication contains of a baseband processing, antenna, wireless link Configuration Parameter: Wireless link: f=868 MHz, output power=?, Encryption=? IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X
21 Accountable security system (s,p,d) Assessment Comparison desired Class vs sub-system 1 (s,p,d) Multi-Metrics (weighted subsystems) sub-system 2 (s,p,d) Calculated class PROSA modelling M MM Multi-Metrics Modelling Comp. 1 Comp. 2 Comp. 3 SPD Metrics, from criticality to SPD value Framework Examples of applicability criticality Measurable criticality to measurable: security, privacy and dependability Measurable Security Security is not 0/1 ideal good accep. critical failure IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 15
22 SmartGridSecurity Logo
23 Mission Statement We help the Utility Companies achieve their smart grid goals with higher resiliency and quicker response times against security threats.
24 Privacy Labelling Measure, what you can measure - Make measurable, what you can t measure - Galileo Privacy today based on lawyer terminology words on app terms and conditions Privacy tomorrow A++: sharing with no others A: C: sharing with. The Privacy label for apps and devices IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll 16
25 Answer the Challenges addressed by the EU SCOTT contribution: privacy label? IoTSec.no #IoTSecNO High level view on Security for IoT Nov 2017, Chr. Johansen, J. Noll X
26 Helse, Miljø og Sikkerhet IoT attack -> car crashes? safety! Security affects safety! Security affects core business company confidential information Customer information Privacy regulative (GDPR May2018): 4% of revenue Board of directors IoT is corporate governance Finance, HMS security and safety CEO Buz #1 #2 #3 #4 Need for standardisation in IoT Nov2017, Josef Noll 17
27 Conclusions Service cloud #1 Service cloud #2 Softwareenabled routing VPN #1 Home services Appliance services Car services! Things (IoT) are driving the digital societies! IoT: Business merger Basic Internet low capacity Health services Internet + Semantics + Things = IoT Digitisation of the Society! IoT Security and privacy new security paradigm Security classes, accountable security - security and privacy ontology! competitive advantage e.g.: - Privacy label (A++, A+ D) Smart Energy - Trust Jun2017, Josef Noll 18
Sensor technology - Applications and Challenges
Teknologitimen, Senter for Rettsinformatikk (SERI), 3Apr2018, Oslo Sensor technology - Applications and Challenges Josef Noll, Christian Johansen Department of Technology Systems, University of Oslo m:
More informationCollaboration for a more secure Smart Grid operation
Smart Energy 2017, Halden, Feb 2017 Collaboration for a more secure Smart Grid operation Josef Noll, Christian Johansen UiO IoTSec Project leader/coo jnoll@uio.no, christi@ifi.uio.no #IoTSec, IoT - how
More informationL2 - Internet of Things
UNIK4750 - Measurable Security for the Internet of Things L2 - Internet of Things György Kálmán, UiO/NTNU/mnemonic gyorgy.kalman@its.uio.no Josef Noll UiO/UNIK josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750,
More informationL7 Security Semantics
UNIK4750 - Measurable Security for the Internet of Things L7 Security Semantics György Kálmán, UiO/DNB gyorgy.kalman@its.uio.no Josef Noll UiO josef.noll@its.uio.no http://cwi.unik.no/wiki/unik4750, #IoTSec,
More informationIoTSec - Security in IoT for Smart Grids
www.nr.no IoTSec - Security in IoT for Smart Grids AFSecurity Seminar, Secure October - Security R&D @ UiO and Partners Habtamu Abie, Norwegian Computing Center - NR IFI/Oslo 09/10/2015 IoTSec - Challenges
More informationWP1. Semantic System Description. by Olaf Owe (UiO)
WP1 Semantic System Description by Olaf Owe (UiO) WP1 team Olaf Owe (PMA group leader, leader Conserns) Josef Noll (at UNIK and Movation as well) Christian Johansen (50% IoTSec), senior researcher (UNIK
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationSCOTT Methodology for Building Blocks and Use Cases
SCOTT - Jan2018 SCOTT Methodology for Building Blocks and Use Cases Josef Noll, Maghsoud Morshedi, Toktam Ramezani secure connected trustable things SCOTT has received funding from the Electronic Component
More informationDT-ICT : Big data solutions for energy
DT-ICT-11-2019: Big data solutions for energy info day Stefano Bertolo, DG CONNECT Mario Dionisio, DG ENER Scientific Programme Officers Who we are DG CONNECT, Unit G1 Data Policy and Innovation DG ENERGY,
More informationRegulation and the Internet of Things
Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions
More informationAccess Control and Physical Security Management. Contents are subject to change. For the latest updates visit
Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure
More informationIntelligent Buildings and Cybersecurity
Intelligent Buildings and Cybersecurity March 14-18,2017 Frankfurt, Germany Ron Zimmer CABA President & CEO www.caba.org Connect to what s next 1 CABA Board of Directors and Vision CABA Vision Statement
More informationSecurity and networks
Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,
More informationENCS The European Network for Cyber Security
ENCS The European Network for Cyber Security A not-for-profit European Public Private Partnership on cyber security for critical infrastructures Initial focus: smart grids and process control, to be extended
More informationThrive in today's digital economy
Thrive in today's digital economy TABLE OF CONTENTS "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines
More informationThrive in today's digital economy
Thrive in today's digital economy "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines and automated
More informationDigital transformation in the Networked Society. Milena Matic Strategy, Marketing & Communications June 2016
Digital transformation in the Networked Society Milena Matic Strategy, Marketing & Communications June 2016 Connections (billion) Everything that benefits from a connection will be connected 50 Our vision
More informationSECURING THE CONNECTED ENTERPRISE.
SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE
More informationD Analysis of IoT Sec Ecosystem. By Konstantin Lenchik Supervisor: Prof. Einar Arthur Snekkenes, Prof. Josef Noll
D 4.1.1 Analysis of IoT Sec Ecosystem By Konstantin Lenchik Supervisor: Prof. Einar Arthur Snekkenes, Prof. Josef Noll Defined groups of Stakeholders 1. Production of energy 2. TSO 3. DSO 4. Security companies
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationINtelligent solutions 2ward the Development of Railway Energy and Asset Management Systems in Europe.
INtelligent solutions 2ward the Development of Railway Energy and Asset Management Systems in Europe. Introduction to IN2DREAMS The predicted growth of transport, especially in European railway infrastructures,
More informationDiscussion on MS contribution to the WP2018
Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several
More informationEuropean nanoelectronics innovation: One strategy Multiple instruments
European nanoelectronics innovation: One strategy Multiple instruments Fred van Roosmalen Vice President NXP Semiconductors European Nanoelectronics Forum 2014 Cannes, November 27, 2014 Connected Car Security
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationR&D on Trust & Security. Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security
Overview of DG INFSO R&D on Trust & Security Vilija Juceviciene European Commission Information Society and Media Directorate General Unit F5 - Trust & Security Setting the scene - The Digital Wave Sophia
More informationEU Innovation Investments: The Challenges met by Innovation Infrastructures Today in Europe
EU Innovation Investments: The Challenges met by Innovation Infrastructures Today in Europe Ronan Burgess Acting Head of Unit A1 Photonics Directorate A - Components and Systems DG CONNECT, European Commission
More informationThis is the Next Industrial Revolution: The Industrial Internet. 8 February 2017
This is the Next Industrial Revolution: The Industrial Internet 8 February 2017 A fundamental new rule for business is that the Internet changes everything. -Bill Gates, 1999 Or has it? February 13, 2017
More informationShaping Tomorrow s Sustainable
Shaping Tomorrow s Sustainable Cities Today: The Role of ITU Cristina Bueti Adviser and ITU Focal Point on Environment and Climate Change 1 City is an Holistic System economically compete sustainably
More informationSecond Workshop of India-EU Collaboration on Standardization for Select Technologies
Second Workshop of India-EU Collaboration on Standardization for Select Technologies TSDSI s Vision & Roadmap for 5G Nov 05, 2015 Vinosh James Lead, Technical Standards for Qualcomm, and Chair, 5G WG of
More informationR&D to shape the networks and services of the future
R&D to shape the networks and services of the future IEEE-ICC'13 Budapest, 12 th June 2013 Panel: Horizon 2020 Europe's major new collaborative R&D Programme Luis Rodríguez-Roselló European Commission
More informationClarity on Cyber Security. Media conference 29 May 2018
Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More informationERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford
Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in
More informationSecuring the Cloud Today: How do we get there?
Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,
More informationThe Programmable World Opportunities and Challenges
The Programmable World Opportunities and Challenges Guillaume Mascot Head of Government Relations APJ & India March 2017 1 Nokia 2016 Megatrends are bringing the programmable world Network, compute & storage
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationQuality Assurance in 5G SME Engagement
Quality Assurance in 5G SME Engagement Janez Sterle 2017 Internet Institute. All Rights Reserved. 5G PPP - Information Day Ljubljana; October 2017 INTERNET INSTITUTE Ltd. SME from Ljubljana, Slovenia Established
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationIntelligent Building and Cybersecurity 2016
Intelligent Building and Cybersecurity 2016 Landmark Research Executive Summary 2016, Continental Automated Buildings Association Presentation Contents 1. About CABA, Compass Intelligence & This Research
More informationSviluppi e priorità europee nel settore delle smart grids. M. de Nigris
Sviluppi e priorità europee nel settore delle smart grids M. de Nigris DRIVERS FOR AN ENERGY (R)EVOLUTION IN EUROPE INCREASING ENERGY BILL EUROPEAN ENERGY BILL FOR IMPORT: 1 b /DAY VOLATILITY OF ENERGY
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationINSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom
INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements
More informationThe MovingLife Project
The MovingLife Project MObile ehealth for the VINdication of Global LIFEstyle change and disease management solutions Stakeholders Conference The MovingLife Roadmaps Brussels 18 April 2013 Alessio Gugliotta
More informationSupply Chain Integrity and Security Assurance for ICT. Mats Nilsson
Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print
More informationUpcoming EC Systems Research Perspectives
Upcoming EC Systems Research Perspectives Neeraj Suri Dept. of Computer Science TU Darmstadt, Germany Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de EU Computing Systems Strategy
More informationMaking 5G a commercial reality
Making 5G a commercial reality Dr. Brahim GHRIBI Head of Government Relation Middle East & Africa Nokia 1 Nokia 2016 Public The journey for human technology Mobile networks today and tomorrow Mobile Voice
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCIO Forum Maximize the value of IT in today s economy
CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed
More informationInternet of Things: Driving the Transformation
Internet of Things: Driving the Transformation Annabel Nickles, PhD, MBA Director, Emerging Platform Solutions Integrated Computing Research Intel Labs 1 What Are People Saying about IOT? Vol. 12345 Nr.001
More informationSmart Systems and Heat
Smart Systems and Heat 02 03 Why? Our Smart Systems and Heat programme is focused on creating future-proof and economic local heating solutions for the UK Heat accounts for over 40% of the UK s demand
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More informationFINLAND & SMART ENERGY. Pekka Sivonen Executive Director Digital Transformation of Finnish Industries May 2018
FINLAND & SMART ENERGY Pekka Sivonen Executive Director Digital Transformation of Finnish Industries May 2018 DIGITALISATION DIGITALISATION: VISION VISION AND MISSION Simplifying smart: We will make the
More informationIntroduction of the Industrial Internet Consortium. May 2016
Introduction of the Industrial Internet Consortium May 2016 An Open Membership Consortium now 250 companies strong May 26, 2016 2 IIC Founders, Contributing Members, & Large Industry Members IIC Founding
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationSmart Energy Programme. Pia Salokoski
Smart Energy Programme Pia Salokoski Smart Energy Programme Smart Energy - Joint Programme between Tekes and Finpro 2017-2021 Connectivity and integration are driving new energy technologies, industry
More informationInternet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA
Internet of Things, A European Outlook Antonis Tzortzakakis, Treasurer ECTA Internet of Things IoT represents the next step towards the digitalisation of our society and economy, where objects and people
More informationStandards for V2X Communication and Implications for OEMs and ITS
Standards for V2X Communication and Implications for OEMs and ITS FISITA Jürgen Daunis London Nov. 12, 2015 PACE OF CHANGE >50 billion connected devices Connections (billion) 25 years 5 billion connected
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationGrid BT. The evolution toward grid services. EU Grid event, Brussels May Piet Bel Grid Action Team
Grid Computing @ BT The evolution toward grid services EU Grid event, Brussels May 31 05 Piet Bel Grid Action Team Agenda BT Why Grid? What is BT doing? Evolution of Grid Services Q & A 2 Forward-looking
More informationHorizon 2020 Security
Horizon 2020 Security Best Practices for Security Proposal Writing Armand Nachef Coordinator of the French Security NCP Consortium, CEA armand.nachef@cea.fr KEY MESSAGES FOR PUTTING TOGETHER A HORIZON
More informationSmart Systems and Heat
Smart Systems and Heat 02 03 Energy Technologies Institute www.eti.co.uk Why? Our Smart Systems and Heat programme is focused on creating future-proof and economic local heating solutions for the UK Heat
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationThe Internet of Things and Security
INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet
More informationPolicy Session 4 Identifying Risk: An abundance of Potential Shock Waves
Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Ray Stanton Interim Group CiSO & Director Digital Risk, National Grid &, Group CiSO/CiRO, Redwood Technologies Group 9 th May 2017
More informationEuropean Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016
European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016 Présentation Géraud Canet geraud.canet@cea.fr ABOUT THE CYBERSECURITY cppp 3 AIM 1. Foster cooperation between public
More informationHow the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015
How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of
More informationDigital Co-Creation with Hybrid IT. Fujitsu World Tour 2017
Digital Co-Creation with Hybrid IT Fujitsu World Tour 2017 0 Copyright 2017 FUJITSU The Industrial Revolution The original disruptor that brought us to a new world The Industrial Revolution was a period
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationMission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS
Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber
More informationDEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.
DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY
More informationNCCoE TRUSTED CLOUD: A SECURE SOLUTION
SESSION ID: SPO1-W14 NCCoE TRUSTED CLOUD: A SECURE SOLUTION Donna Dodson Associate Director Chief Cyber Security Advisor of the Information Technology Laboratory, Chief Cybersecurity Advisor for the National
More informationMedia (NEM) Initiative
Networked and Electronic Media (NEM) Initiative NEM Initiative and involvement of Game developers Possibilities for participation in the new EU funding work programme 2011 Dr.-Ing. Halid Hrasnica Eurescom
More informationCHALLENGES GOVERNANCE INTEGRATION SECURITY
CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises
More informationThe world's leading Provider of open source Enterprise IT products and services Rainer Liedtke
The world's leading Provider of open source Enterprise IT products and services Regional Director EMEA Sales, Country Manager Germany 1 Status Of Open Source Software Adoption 2 What Do These Numbers Represent?
More informationDigital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe
Digital (Virtual) Identities in Daidalos and beyond Amardeo Sarma NEC Laboratories Europe Who wants to pay for more Bandwidth? More Access Bandwidth? No one pays extra for volume or time plain usage is
More informationTowards an integrated regulation platform in Luxembourg. Information Security Education Day th of april
Towards an integrated regulation platform in Luxembourg Information Security Education Day 2017-28 th of april Context A complex and inter-connected digital ecosystem contributing to all sectors A set
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More informationNew Digital Business Models Driving the Softwarization of the Network
New Digital Business Models Driving the Softwarization of the Network Marc Halbfinger January 2018 Here To Serve Headquartered in Hong Kong PCCW consolidated 2016 Revenue: US$4.9 billion HKT 2016 Revenue:
More informationBig Data Value cppp Big Data Value Association Big Data Value ecosystem
Big Data Value cppp Big Data Value Association Big Data Value ecosystem Laure Le Bars, SAP, BDVA President and BDVe lead Nuria de Lama, ATOS, BDVA Deputy Secretary General, BDVe co-lead Ana García Robles,
More informationH2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy
H2020-LEIT-ICT WP2018-2020 European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy Kimmo Rossi DG CNECT.G1 Data Policy and Innovation Unit Problem statement Sharing
More informationCyber Security in Europe and CEER s new PEER initiative
NARUC-CEER International Forum, 27 April 2017, Arlington, Virginia Cyber Security in Europe and CEER s new PEER initiative Lord Mogg, CEER President Outline New EU legislativedevelopments: NIS Directive
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationCisco 5G Now! Product Announcements. February, 2018
Cisco 5G Now! Product Announcements February, 2018 Mobile Cloud Services 2017 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Application Access (%) Displacing Legacy, Mobile
More informationS1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING. Competitiveness of Industry by means of Cross Fertilisation
S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING Competitiveness of Industry by means of Cross Fertilisation STORYLINE: FOCUS ON KEY ENABLERS FOR DISTRIBUTED INDUSTRIALS SYSTEMS HOW
More informationTransforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world
Transforming the utilities industry How our insight and infrastructure can help you thrive in a changing world The utilities industry is changing You need to be leaner, greener and smarter. And we re here
More informationSmart Energy. Neil Pennington, Director of Smart Innovation
Smart Energy Neil Pennington, Director of Smart Innovation 1 Standard disclaimer I will not > Provide a party political broadcast on behalf of the npower party!! > Seek to score political points all Suppliers
More informationMobile Connect Driving Global Economic Growth Through Secure Mobile Identity
Mobile Connect Driving Global Economic Growth Through Secure Mobile Identity Marta Ienco, Regulatory and Policy Director 21 st April 2016 UNCITRAL Colloquium on Legal issue Related to Identity Management
More informationGDPR: The Day After. Pierre-Luc REFALO
GDPR: The Day After Pierre-Luc REFALO The speaker: Pierre-Luc REFALO Global Head of Strategic Cybersecurity Consulting 25+ years in Information & Cyber Security consultancy CISO for SFR & Vivendi Universal
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationRSA Advanced Cyber Defence Summit
Lee Edge Head Archer Business UK&I RSA Advanced Cyber Defence Summit London 30-April-2015 1 64% 8% 2014 Gartner CEO and Senior Executive Survey: 'Risk-On' Attitudes Will Accelerate Digital Business. 2
More informationPRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The
More informationNational Cybersecurity Center of Excellence
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Briefing to ITEA Cyber Workshop 29 March 2017 STRATEGY VISION ADVANCE CYBERSECURITY
More informationWebinar on 5G funding opportunities for EU-US collaboration in Horizon 2020
Webinar on 5G funding opportunities for EU-US collaboration in Horizon 2020 Prof. Gerhard Fettweis Vodafone Chair Professor at TU Dresden Coordinator 5G Lab Germany PICASSO 5G Networks Expert Group Chair
More informationUSING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT
USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.
More informationThird annual ITU IMT-2020/5G Workshop and Demo Day 2018
All Sessions Outcome Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 Geneva, Switzerland, 18 July 2018 Session 1: IMT-2020/5G standardization (part 1): activities and future plan in ITU-T SGs 1.
More information