The Internet of Things. Presenter: John Balk

Size: px
Start display at page:

Download "The Internet of Things. Presenter: John Balk"

Transcription

1 The Internet of Things Presenter: John Balk

2 Internet of Things What is IoT? IoT Data / Predictions IoT Players Cyber Threats Why is it Important to You? 2

3 What is IoT? Linking smart objects to the Internet Network that allows objects to collect & exchange data IoT allows objects to be sensed and controlled remotely across existing network infrastructure Enables exchange of data like never before and brings users information in a more secure way 3

4 The Internet of Things 50 billion connected devices by 2020 More than 6 connected devices per Person $1.7 trillion in value added to the global economy in 2019 By 2020 IoT will be more than double the size of the smartphone, PC, tablet, connected car, and the wearable market combined Technologies and services generated global revenues of $4.8 trillion in 2012 and will reach $8.9 trillion by 2020, growing at a compound annual rate (CAGR) of 7.9% 4

5 IoT at Home 5

6 Example IoT at Work Connected Smart Homes AG turning dirt into data Digital health Energy management OTT video services Self driving cars 6

7 Most Powerful IoT s Companies 7

8 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed Risks do eiusmod tempor The OWASP Internet of Things Top 10 I1 Insecure Web Interface I2 Insufficient Authentication/Authorization I3 Insecure Network Services I4 Lack of Transport Encryption I5 Privacy Concerns I6 Insecure Cloud Interface I7 Insecure Mobile Interface I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security The project walks through the top ten security problems that are seen with IoT 8

9 Under attack Abuses of IoT devices Computational capabilities, increasing capabilities of computers and Internet connections makes IoT devices a privileged attack tool for hackers IoT devices are and will be used to: Send Spam Coordinate an attack against critical infrastructure (Telecom, Water/Wastewater, power, police/fire response) Serve up malware Work as entry points within corporate networks Collect personal data to be used against you Potential of IoT devices is unlimited, like their abuses 9

10 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyber Threats and Security Challenges Securing the IoT world Working with IoT devices within your organization should follow the same basic principles and strategies as you deal with traditional IT security. Following a comprehensive framework is critical to success. 1. Security Posture / Risk Assessment 2. Secure both information and devices 3. Align IoT / IT strategy and security 4. Identify legal and regulatory issues 10

11 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyber Threats and Security Challenges Securing the IoT world Security Posture / Risk Assessment First step is to conduct a comprehensive security assessment: Review of processes, devices, protocols, networks, applications throughout the organization Assess the security vulnerabilities throughout Map out scenarios and prioritize Determine possible architecture remediation (such as firewalling, device isolation, etc.) to protect the crown jewels Gauge value of data 11

12 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyber Threats and Security Challenges Securing the IoT world Secure both information and devices IT security solutions deal primarily with protecting sensitive information the lifeblood of any organization from theft, exposure, or corruption Some information and devices are more important than others: RFID on a package for tracking not particularly value target for compromise Sensors on a patient, gold shipment or a water treatment system high value targets and highly susceptible to compromise Water or telecom systems have operational security threats as well as informational security concerns 12

13 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyber Threats and Security Challenges Securing the IoT world Align IoT / IT strategy and security IT and business strategies must be tightly integrated and complementary The effectiveness of an IoT / IT deployment can be undermined if your organization isn t fully engaged in the effort from the top down 13

14 Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor Cyber Threats and Security Challenges Securing the IoT world Identify legal and regulatory issues We must also consider the legal and regulatory requirements and exposures during the assessment. Most companies already understand the liabilities they face if, for example, they allow the theft of Social Security numbers or medical files HOWEVER!!! The consequences of an IoT device that is manipulated to cause physical harm will quickly surpass those associated with many information breaches Insurance and regulatory agencies are now trending toward finding organizations negligent following basic security incidents and breaches that do NOT perform due diligence by following a security framework 14

15 Why is IoT Important to Rural ILEC s? Increased Broadband usage and network traffic is a BIG positive for you The most robust Broadband network available will be invaluable to IoT users An opportunity for you to monetize higher Broadband speeds required 15

16 Hooking The Customer Customers that view your Broadband as simply and websites are more likely to see Wireless options as a substitute We need to show customers the full power of Broadband The IoT, including Smart Home Applications, are an easy and effective way to hook your customers by demonstrating the benefits of a Broadband connection 16

17 17

18 Positioning Broadband Increased Speeds / Tiers Meeting Customer Needs? Margins Customer Education Awareness Capacity Features vs. Benefits Create Demand 18

19 Speed Tiers Technology Company Speed Tiers (Download) Speed Tiers (Upload) DSL Cable Fiber Satellite AT&T-DSL AT&T-Uverse CenturyLink Cablevision Charter TWC Frontier Fiber Verizon Fiber Hughes Viasat/Exede 12 3 The most popular advertised service tiers 19

20 Higher Speeds Consumer migration to higher advertised download speed 20

21 Offers That Support Technology Trends They really only use the Internet for Keys to a successful plan structure Consider a Triple Threat Approach Cost Competition Consumer Drive customers to what YOU want them to subscribe to What type of experience do we want our customers to have? 21

22 IoT Social Impact 22

23 IoT Summary How it Impacts You and Your Customer? Broadband High Speeds Robust Networks 23

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Cybersecurity for Service Providers

Cybersecurity for Service Providers Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:

More information

L attuale scenario in cyber security all indomani dell adozione di nuovi quadri normativi europei

L attuale scenario in cyber security all indomani dell adozione di nuovi quadri normativi europei L attuale scenario in cyber security all indomani dell adozione di nuovi quadri normativi europei Napoli November 08, 2017 Pierluigi PAGANINI There are two types of companies: those who have been hacked,

More information

Regulation and the Internet of Things

Regulation and the Internet of Things Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions

More information

Security Audit What Why

Security Audit What Why What A systematic, measurable technical assessment of how the organization's security policy is employed at a specific site Physical configuration, environment, software, information handling processes,

More information

Key Aspects of Cybersecurity in the context of Internet of Things (IOT) Raj Kumar

Key Aspects of Cybersecurity in the context of Internet of Things (IOT) Raj Kumar Key Aspects of Cybersecurity in the context of Internet of Things (IOT) Raj Kumar Key Aspects of Cybersecurity in the context of Internet of Things (IOT) IoT Security Challenges and Recent Incidents The

More information

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS July 2018 WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS JUST WHAT THE DOCTOR ORDERED... PROTECT PATIENT DATA, CLINICAL RESEARCH AND CRITICAL INFRASTRUCTURE HEALTHCARE S KEY TO DEFEATING IOT CYBERATTACKS

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

mhealth SECURITY: STATS AND SOLUTIONS

mhealth SECURITY: STATS AND SOLUTIONS mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

Cyber Security. It s not just about technology. May 2017

Cyber Security. It s not just about technology. May 2017 Cyber Security It s not just about technology May 2017 Introduction The Internet has opened a new frontier in warfare: everything is networked and anything networked can be hacked. - World Economic Forum

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

Connected Medical Devices

Connected Medical Devices Connected Medical Devices How to Reduce Risks Inherent in an Internet of Things that Can Help or Harm Laura Clark Fey, Esq., Principal, Fey LLC Agenda Overview of the Internet of Things for Healthcare

More information

IoT and Smart Infrastructure efforts in ENISA

IoT and Smart Infrastructure efforts in ENISA IoT and Smart Infrastructure efforts in ENISA Dr. Dan Tofan IoT workshop BEREC 01.02.2017, Brussels European Union Agency for Network and Information Security Everything becomes connected Manufacturers

More information

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP

More information

An ICS Whitepaper Choosing the Right Security Assessment

An ICS Whitepaper Choosing the Right Security Assessment Security Assessment Navigating the various types of Security Assessments and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding the available

More information

Copyright 2017 Ford Motor Company, All Rights Reserved

Copyright 2017 Ford Motor Company, All Rights Reserved - Research Analyst Digitization - IT Research and Innovation - PhD Candidate University of Michigan Dearborn - Machine Learning in Automotive Security - Vice Chair - IEEE SEM 01 02 03 04 05 Intro Ford

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Ransomware, Viruses, and Hackers in Health Care: Five Steps to Avoid Being the Next Victim. Michael Overly and Chanley Howell.

Ransomware, Viruses, and Hackers in Health Care: Five Steps to Avoid Being the Next Victim. Michael Overly and Chanley Howell. Ransomware, Viruses, and Hackers in Health Care: Five Steps to Avoid Being the Next Victim Michael Overly and Chanley Howell February 29, 2016 Attorney Advertising Prior results do not guarantee a similar

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber

More information

REGULATORY FRAMEWORK ON OTT SERVICES A.ROBERT J RAVI I.T.S ADVISOR TELECOM REGULATORY AUTHORITY OF INDIA

REGULATORY FRAMEWORK ON OTT SERVICES A.ROBERT J RAVI I.T.S ADVISOR TELECOM REGULATORY AUTHORITY OF INDIA REGULATORY FRAMEWORK ON OTT SERVICES A.ROBERT J RAVI I.T.S ADVISOR TELECOM REGULATORY AUTHORITY OF INDIA 1 What is OTT? Applications and services which are accessible over the internet and ride on operators

More information

HEALTH CARE AND CYBER SECURITY:

HEALTH CARE AND CYBER SECURITY: HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers

More information

M1, Singapore. Industry Trends Driving ICT Strategies

M1, Singapore. Industry Trends Driving ICT Strategies ASIA-PACIFIC TELECOMMUNITY 15th APT Policy and Regulatory Forum (PRF-15)) 3-5 August 2015, Singapore Document PRF-15/INP-33 4 August2015 M1, Singapore Industry Trends Driving ICT Strategies Contact : Tel:

More information

Advanced Systems Security: Future

Advanced Systems Security: Future Advanced Systems Security: Future Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Penn State University 1 Privilege Separation Has been promoted for some time Software-Fault Isolation

More information

Choosing the Right Security Assessment

Choosing the Right Security Assessment A Red Team Whitepaper Choosing the Right Security Navigating the various types of Security s and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding

More information

How to Prepare a Response to Cyber Attack for a Multinational Company.

How to Prepare a Response to Cyber Attack for a Multinational Company. You Have Been Breached! How to Prepare a Response to Cyber Attack for a Multinational Company. Chayan Chakravarti, MBA, CISM, PMP Patrick Enyart, CISA, CISM, CRISC Presenters Chayan Chakravarti Manager,

More information

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure

More information

SECURING THE CONNECTED ENTERPRISE.

SECURING THE CONNECTED ENTERPRISE. SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE

More information

Syed Ismail Shah, PhD Chairman, PTA,

Syed Ismail Shah, PhD Chairman, PTA, Preparing for the Changing Rules of the Game Syed Ismail Shah, PhD Chairman, PTA, e-mail: ismail@pta.gov.pk Sequence Presentation Outline 2 Paradigm Shift in Telecom Sector-OTT Services Difference Between

More information

A Guide to Ensuring Security and Resiliency

A Guide to Ensuring Security and Resiliency Protecting Your Business Network: A Guide to Ensuring Security and Resiliency Even as major news outlets continue to report new stories about massive security breaches at the world s largest companies,

More information

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action 2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action April 11, 2018 Contact Information Casie D. Collignon Partner Denver 303.764.4037 ccollignon@bakerlaw.com

More information

Medical Device Safety in a Connected World

Medical Device Safety in a Connected World Mr. Clark Fortney Senior Software Engineer Medical Device Safety in a Connected World IoT Expo June 6-8 2017 1 Clark Fortney My Background 20 years designing systems & software for medical devices at Battelle.

More information

Exposing The Misuse of The Foundation of Online Security

Exposing The Misuse of The Foundation of Online Security Exposing The Misuse of The Foundation of Online Security HLA ID: 90FZSBZFZSB 56BVCXVBVCK 23YSLUSYSLI 01GATCAGATC Cyber space is very similar to organic realm Keys & certificates are like HLA tags But,

More information

Cybersecurity The Evolving Landscape

Cybersecurity The Evolving Landscape Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

Mobile Data for Public and Personal Health

Mobile Data for Public and Personal Health Mobile Data for Public and Personal Health Big Data and AI for Achieving UHC An International Consultation on Ethics Diana Zandi Miami, USA 12 13 October, 2017 Mobile data for public and personal health

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

Keys to a more secure data environment

Keys to a more secure data environment Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting

More information

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology Securing Cloud Applications with a Distributed Web Application Firewall www.riverbed.com 2013 Riverbed Technology Primary Target of Attack Shifting from Networks and Infrastructure to Applications NETWORKS

More information

Security and networks

Security and networks Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cyber Security in Smart Commercial Buildings 2017 to 2021 Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the

More information

The Top 6 WAF Essentials to Achieve Application Security Efficacy

The Top 6 WAF Essentials to Achieve Application Security Efficacy The Top 6 WAF Essentials to Achieve Application Security Efficacy Introduction One of the biggest challenges IT and security leaders face today is reducing business risk while ensuring ease of use and

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.

More information

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe Copyright 2017 Protocol 46, Inc. All Rights Reserved Copyright 2017 Protocol 46, Inc.

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria Digital Healthcare Yordan Iliev Director R&D Healthcare Regional Cybersecurity Forum, 29-30 November 2016, Grand Hotel Sofia, Bulgaria AGENDA Introduction Security challenges in healthcare IT Change ahead

More information

Network Neutrality is About Money, not Packets (Price discrimination, not packet discrimination)

Network Neutrality is About Money, not Packets (Price discrimination, not packet discrimination) Network Neutrality is About Money, not Packets (Price discrimination, not packet discrimination) Henning Schulzrinne SDP Workshop May 2018 This material is based upon work supported by the National Science

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

SecurityScorecard 2018 Healthcare Report. A Pulse on the Healthcare Industry's Cybersecurity Risks

SecurityScorecard 2018 Healthcare Report. A Pulse on the Healthcare Industry's Cybersecurity Risks SecurityScorecard 2018 Healthcare Report A Pulse on the Healthcare Industry's Cybersecurity Risks securityscorecard.com [800] 682 1707 Overview Since we issued our last report in 2016 on the cyberhealth

More information

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017 CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey CyberMaryland Conference 2017 Bob Andersen, Sr. Manager Federal Sales Engineering robert.andersen@solarwinds.com

More information

Internet of Things (IoT) Securing the Connected Ecosystem

Internet of Things (IoT) Securing the Connected Ecosystem Internet of Things (IoT) Securing the Connected Ecosystem June 2018 Making sense of the buzzwords: What is the Internet of Things Internet of Things (IoT) refers to a world of intelligent, connected devices

More information

Date Approved: Board of Directors on 7 July 2016

Date Approved: Board of Directors on 7 July 2016 Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory

More information

Healthcare HIPAA and Cybersecurity Update

Healthcare HIPAA and Cybersecurity Update Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Living on the Edge. Myla V. Pilao - Director TrendLabs Marketing Trend #CLOUDSEC

Living on the Edge. Myla V. Pilao - Director TrendLabs Marketing Trend  #CLOUDSEC Living on the Edge Myla V. Pilao - Director TrendLabs Marketing Trend Micro @trendlabs www.cloudsec.com #CLOUDSEC Outline Picture calm and carefree world Auto command (pattern/trend), voice command, change

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Map Me To ZERO Waste. Putthisak Panomsarnnarin. Thammasat University.

Map Me To ZERO Waste. Putthisak Panomsarnnarin. Thammasat University. Map Me To ZERO Waste Putthisak Panomsarnnarin Thammasat University. Chemical Substance Identified Problems Leftover Improper Waste Disposal & Collection Solution Difficulties in Accessing to Waste Management

More information

Palmetto rural telephone cooperative, INC. Network TRANSPARENCY statement

Palmetto rural telephone cooperative, INC. Network TRANSPARENCY statement Palmetto rural telephone cooperative, INC. Network TRANSPARENCY statement Palmetto Rural Telephone Cooperative, Inc. ( PRTC or Company ) provides this Network Transparency Statement in accordance with

More information

From Managed Security Services to the next evolution of CyberSoc Services

From Managed Security Services to the next evolution of CyberSoc Services From Managed Security Services to the next evolution of CyberSoc Services Gianluca Busco Arré Country Manager pandasecurity.com MSSP / MDR Where the Industry is going leaders and laggers MSSP industry

More information

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange STANDARD INFORMATION SHARING FORMATS Will Semple Head of Threat and Vulnerability Management New York Stock Exchange AGENDA Information Sharing from the Practitioner s view Changing the focus from Risk

More information

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. June 2017 Melanie Duerr Fazzi Associates Partner, Director of Coding Operations Jami Fisher Fazzi Associates Chief Information

More information

Onapsis: The CISO Imperative Taking Control of SAP

Onapsis: The CISO Imperative Taking Control of SAP Onapsis: The CISO Imperative Taking Control of SAP Cyberattacks @onapsis 2016 Key SAP Cyber-Security Trends Over 95% of the SAP systems we have assessed, were exposed to vulnerabilities that could lead

More information

Network TRANSPARENCY statement

Network TRANSPARENCY statement Network TRANSPARENCY statement ND Tel ( NDTC or Company ) provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom Rules to ensure that you have sufficient information

More information

Netwrix Virtual. Customer Summit 2016

Netwrix Virtual. Customer Summit 2016 Netwrix Virtual Customer Summit 2016 Welcome Michael Fimin Chief Executive Officer Phone: 1.949.407.5125 x1057 Email: Michael.Fimin@netwrix.com linkedin.com/in/michaelfimin Agenda Michael Fimin Chief Executive

More information

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS Surprisingly Successful: What Really Works in Cyber Defense John Pescatore, SANS 1 Largest Breach Ever 2 The Business Impact Equation All CEOs know stuff happens in business and in security The goal is

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

Livingston Communications. Network TRANSPARENCY statement

Livingston Communications. Network TRANSPARENCY statement Livingston Communications Network TRANSPARENCY statement Livingston Communications provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom Rules to ensure that

More information

IoT Security and Risk Management

IoT Security and Risk Management SESSION ID: GPS1-R03 IoT Security and Risk Management Tyson Macaulay Chief Security Strategist, Fortinet IoT Security is a BIG STORY! Security as a % of IT Budget 4% 7% 20 Billion+ devices? 2% Source:

More information

ANATOMY OF AN ATTACK!

ANATOMY OF AN ATTACK! ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable

More information

Addressing the elephant in the operating room: a look at medical device security programs

Addressing the elephant in the operating room: a look at medical device security programs Addressing the elephant in the operating room: a look at medical device security programs Ernst & Young LLP Presenters Michael Davis Healthcare Leader Baltimore +1 410 783 3740 michael.davis@ey.com Esther

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly 2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly please download the guide at https://otalliance.org/incident 2017 Cyber Incident & Breach Readiness Webinar Craig Spiezle Executive Director

More information

Rethinking Information Security Risk Management CRM002

Rethinking Information Security Risk Management CRM002 Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design

More information

CyberArk Privileged Threat Analytics

CyberArk Privileged Threat Analytics CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical

More information

FDA & Medical Device Cybersecurity

FDA & Medical Device Cybersecurity FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US

More information

Privacy and Security in the Age of Meaningful Use

Privacy and Security in the Age of Meaningful Use Privacy and Security in the Age of Meaningful Use David S. Finn Health IT Officer Lewis Etheridge Principal Systems Engineer, Symantec Healthcare Privacy & Security in the Age of Meaningful Use SYMANTEC

More information

Jeff Wilbur VP Marketing Iconix

Jeff Wilbur VP Marketing Iconix 2016 Data Protection & Breach Readiness Guide February 3, 2016 Craig Spiezle Executive Director & President Online Trust Alliance Jeff Wilbur VP Marketing Iconix 1 Who is OTA? Mission to enhance online

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev

More information

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016 2016 Tri-State CF Partnership Webinar Series Cyber Crime Trends a State of the Union April 7, 2016 Presenter Mark Eich, Principal Information Security Services Group CliftonLarsonAllen 2014 CliftonLarsonAllen

More information

ISACA West Florida Chapter - Cybersecurity Event

ISACA West Florida Chapter - Cybersecurity Event ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015

More information

IT Security in a Meaningful Use Era C&SO HIMSS Meeting

IT Security in a Meaningful Use Era C&SO HIMSS Meeting CSOHIMSS 2011 Slide 1 October 21, 2011 October 21, 2011 IT Security in a Meaningful Use Era C&SO HIMSS Meeting Presented by: Mac McMillan CEO CynergisTek, Inc. Chair, HIMSS Privacy & Security Task Force

More information

Southwest Arkansas telephone cooperative. Network TRANSPARENCY statement

Southwest Arkansas telephone cooperative. Network TRANSPARENCY statement Southwest Arkansas telephone cooperative Network TRANSPARENCY statement Southwest Arkansas Telephone Cooperative ( SWATCO or Company ) provides this Network Transparency Statement in accordance with the

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information