CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Similar documents
Trusted Platform Module explained

Strong Security Elements for IoT Manufacturing

Siemens Research Cyber Security

Cloud FastPath: Highly Secure Data Transfer

PT Unified Application Security Enforcement. ptsecurity.com

Security+ SY0-501 Study Guide Table of Contents

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President

Internet of Things Toolkit for Small and Medium Businesses

Cybersecurity for IoT to Nuclear

Connect Securely in an Unsecure World. Jon Clay Director: Global Threat

Cyber Defense Operations Center

How to improve Data Security

CYBERSECURITY AND SERVICE STATIONS

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

Enterprise Connected Video Security

Most Common Security Threats (cont.)

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect

MASP Chapter on Safety and Security

Solutions to prevent IoT devices to be used for DDOS attacks. WISeKey General Business Use

The Road to Industry 4.0

EU-R VIDEO SECURITY, DATA PROTECTION AND DATA SECURITY

The next step in IT security after Snowden

Secure Access & SWIFT Customer Security Controls Framework

The Device Has Left the Building

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

WHITEPAPER. Security overview. podio.com

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

Securing the future of mobility

WHITE PAPER. Secure communication. - Security functions of i-pro system s

Verkada Inc. 210 South B Street, San Mateo, California,

A Peek at the Future Intel s Technology Roadmap. Jesse Treger Datacenter Strategic Planning October/November 2012


Comodo Certificate Manager

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Security

Storage as an IoT Device Roundtable Walt Hubis, CISSP Tom Coughlin

IoT & SCADA Cyber Security Services

Scalable Security solutions to enable Cyber Security and to manage Digital Identities

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Cyber Security Guidelines for Securing Home and Small Office Routers

Provisioning secure Identity for Microcontroller based IoT Devices

Internet of Things (IOT) What It Is and How It Will Impact State Pools

Innovation policy for Industry 4.0

How Secure is your Video Surveillance System?

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

Securing Information Systems

Artificial Intelligence Drives the next Generation of Internet Security

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Securing Network Devices with the IEC Standard What You Should Know. Vance Chen Product Manager

Encrypted Traffic Security (ETS) White Paper

Designing Security & Trust into Connected Devices

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com

Cyber Security Requirements for Electronic Safety and Security

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

The Oracle Trust Fabric Securing the Cloud Journey

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Stopping Advanced Persistent Threats In Cloud and DataCenters

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

IndusSec. Industrial Network Security System. 9three Solutions Inc.

Security Vendor Line Card

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

The following chart provides the breakdown of exam as to the weight of each section of the exam.

AS emas emudhra Authentication Solution

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Secure Communications on VoIP Networks

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!?

RSA SecurID Implementation

PCI DSS and VNC Connect

How I Learned to Stop Worrying and Love the Internet of Things

Jeff Wilbur VP Marketing Iconix

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

Security Enhancements

The Internet of Things and Security

How do you decide what s best for you?

The Internet of Things. Steven M. Bellovin November 24,

Designing Security & Trust into Connected Devices

VNC SDK security whitepaper

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201

SECURING THE CONNECTED ENTERPRISE.

Cyber security of automated vehicles

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen

ArcGIS Enterprise Security: An Introduction. Randall Williams Esri PSIRT

TeamViewer Security Statement

Quick Lockdown Guide. Firmware 6.4

A Taxonomy and a Knowledge Portal for Cybersecurity

This firmware release is a maintenance release based on FW

En partenariat avec CA Technologies. Genève, Hôtel Warwick,

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team

Windows IoT Security. Jackie Chang Sr. Program Manager

Octopus Online Service Safety Guide

IoT Security for Critical Information Infrastructures. Andrey Tikhonov

Transcription:

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

The Market and the Trend Cyber security market (2020): USD 170.21 billion, CAGR ~10% Storage market (2020): USD 18.28 billion, CAGR 22% Tons of data to be processed - Skyrocketing video data Global market for IP cameras CAGR 20%+ Video data more connected 3

Introducing Bosch Group - Key facts for 2017 Ownership 7% Bosch family 1% Robert Bosch GmbH 92% Charitable Robert Bosch Foundation 276 manufacturing sites 400,500* associates incl. 62,500 in R&D 78 billion in sales We have invested more than 30 billion in R&D in the last 6 years Leadership in diverse sectors Energy and Building Technology Leading manufacturer of security, safety and communications solutions and thermo technology Industrial Technology Leading in drive and control technology, packaging and process technology Mobility Solutions One of the world s largest suppliers of cutting-edge automotive technology Consumer Goods World s largest power tool manufacturer and leading manufacturer in household appliances 4

Worldwide projects over the five years Key facts and figures 2017 CSI: Video Surveillance - Converting the Juggernaut Introducing Bosch Security Systems * in round figures Bosch Building Technologies Security and Safety Systems Security Energy and Building Solutions Security & Life Safety Fire Energy Services Communications Building Automation 5

Digital Transformation Opportunities Deep Learning Ultra HD Analytics Intelligence Metadata Remote Access MegaPixel Multiple Sensors Data Security Higher Resolutions Authentication IoT Connectivity Manageability Multiple Streams Artificial Intelligence 6

Challenges from history Analogue past Slow and late digitization Decade-long lifecycles Short-funded public/governmental operators Mentality Analogue video IP video 7

Shifting our own paradigm! PSIRT? SEP Engineering?! 8

Challenges from IP conversion The biggest problem is the mental one The second biggest problem is education The impact is bigger for Industrial Video Surveillance Naivety Consciousness 9

Keep your video data secure Bosch four-step approach considering complete infrastructure 1: Create trust Cameras Storage devices 2: Secure data 3: User access rights 4: Meet IT industry standards Public Key Infrastructure (PKI) Clients Even a single weak link in the surveillance set-up can jeopardize the entire system 10

Keep your video data secure Our system approach: How we secure our cameras? Only secure connections are possible (HTTPS) Password enforcement at initial set up Unsecure ports for automatic discovery disabled Unsecure remote communication disabled Uploading of 3 rd party software not possible Firmware updates by Bosch signed and encrypted files only Unique built-in Trusted Platform Module (TPM) safely stores private keys Embedded Login Firewall improves robustness against DoS attacks Software sealing for camera configuration Cameras (edge devices) 11

Keep your video data secure Our system approach: How we secure our core devices? Support of Microsoft Active Directory for safe management of user access rights Digest access authentication only Regular updates via security patches Servers, clients & storage devices (core devices) 12

Keep your video data secure Our system approach: How we secure communication Unsecure ports disabled by default Unsecure remote communication disabled Password enforcement on set up Network authentication using the 802.1x protocol Secure renegotiation in TLS Supports up to 256 bit keys for AES encryption (Advanced Encryption Standard) Network protocols (communication) 13

Keep your video data secure Our system approach: Protecting the infrastructure Factory-loaded unique Bosch-signed certificates on all cameras Issued by in-house Certificate Authority (Escrypt) Stored in built-in secure crypto-coprocessor (TPM) Supports customer specific certificates Supports 3rd party PKI solutions Certificates (security infrastructure) 14

Keep your video data secure What to expect? And our measures: Uploading Malware infection of 3rd party via Unique built-in firmware software not or third possible party Trusted Side channel Platform attacks Firmware software updates by Module Bosch signed files only User access management Intrusion of in privacy the cameras, recording solutions and software Distributed Denial of Embedded Service attacks Login Firewall (DDOS) Tamper Physical protection theft standard on all Bosch network video security cameras Privilege Support misuse of Microsoft Active Directory Support of token-based authentication 15

How we prove to keep video data secure Security by Design due to embedded Secure Engineering Process (SEP) Continuous vulnerability testing External penetration testing Official certification (pending) 16

Outlook Cloud-based solutions Internet of Things Data Security Smart Apps Cybersecurity Analytics Deep Learning Artificial Intelligence 17

THANK YOU