Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Similar documents
Breaking the Blockchain: Real-World Use Cases, Opportunities and Challenges

Building a More Secure Cloud Architecture

IEEE-SA Internet of Things - Security & Standards

Internet of secure things: issues and perspectives. Pasquale Pace Dimes - UNICAL

Building Trust in the Internet of Things

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

Cyber Attacks & Breaches It s not if, it s When

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

The Internet of Things and Security

The Road to Industry 4.0

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

Cyber-Physical Chain (CPChain) Light Paper

Verizon Software Defined Perimeter (SDP).

Enhancing the cyber security &

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Preserving Data Privacy in the IoT World

SECURING THE CONNECTED ENTERPRISE.

Cybersecurity Solution in Hardware

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

McAfee Embedded Control

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Examining future priorities for cyber security management

MASP Chapter on Safety and Security

Morgan Stanley Digital Day. London, March

National Institute of Standards and Technology

IoT security based on the DPK platform

HK ASTRI FinTech Initiative

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Department of Defense. Installation Energy Resilience

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

Your One Source for Critical Infrastructure Protection Solutions

Achieving End-to-End Security in the Internet of Things (IoT)

Personal Cybersecurity

DoD Mobility briefing for the AFCEA Mobility Summit

CYBER SOLUTIONS & THREAT INTELLIGENCE

Scalable Security solutions to enable Cyber Security and to manage Digital Identities

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

M2MD Communications Gateway: fast, secure and efficient

Smart City in the 5G Era

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

The Importance of Cybersecurity Threat Detection for Utilities

Where Does Your Firm Fall?

Integrated Security Management Framework

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

Power Grid Resilience, Reliability and Security Research at Idaho National Laboratory

OpenWay by Itron Security Overview

A Blockchain-based Architecture for Collaborative DDoS Mitigation with Smart Contracts

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI

M2MD Communications Gateway: fast, secure, efficient

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

Managed Endpoint Defense

Smart Grid Automation in a Cyber-Physical Context

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

WAVE: A decentralised authorization system for IoT via blockchain smart contracts

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

CISCO SHIELDED OPTICAL NETWORKING

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO

Project 2020: Preparing Your Organization for Future Threats Today

McAfee Embedded Control

Airport Security & Safety Thales, Your Trusted Hub Partner

BILLING CODE P DEPARTMENT OF ENERGY Federal Energy Regulatory Commission. [Docket No. RM ] Cyber Systems in Control Centers

Secure Product Design Lifecycle for Connected Vehicles

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

NCCoE TRUSTED CLOUD: A SECURE SOLUTION

Securing V2X communications with Infineon HSM

Ritz Camera Leverages Whitelisting for Picture Perfect Security

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

5 Steps to Government IT Modernization

Innovation policy for Industry 4.0

Bridging The Gap Between Industry And Academia

Digital Trust Ecosystem

to Address Cyber Physical Systems Security (CPSSEC)

Securing the future of mobility

Cyber security mechanisms for connected vehicles

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

Total Video Solution Cybersecurity Protection. ConteraWS Platform Cybersecurity Overview

Cisco Connected Factory Accelerator Bundles

White Paper. Connected Car Brings Intelligence to Transportation

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

Statement for the Record

Securing Your Virtual World Harri Kaikkonen Channel Manager

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Intelligent Building and Cybersecurity 2016

BLOCKCHAIN FOR CYBERSECURITY MICRO-SEGMENTED NETWORK ACCESS CONTROL

Securing the Grid and Your Critical Utility Functions. April 24, 2017

Transcription:

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems Tamper-proof logging of all identity and access 1

Smart, connected devices are now an integral part of our lives, in business and at home The Internet of Things connects numerous everyday devices, opening up previously closed systems to remote access and control Smart homes and offices enabled with a host of connected and smart devices Connected cars, autonomous trucks, unmanned aerial vehicles, etc Industrial control systems w/ cyber-physical platforms managing critical infrastructure Smart Cities with sensors and digital mgmt. systems for energy, utilities, transportation, etc The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025 2

In 2016, botnet armies DDoS attack of DNS infrastructure sent major internet platforms and services offline However, the rapidly growing world of perpetually-connected smart devices presents proportionally large security risks Since 2016, researchers have shown how attackers could hijack a vehicle. In 2017, US Homeland Security cyber sleuths hacked a Boeing 757 as it sat on the runway In 2017, criminals hacked a connected fish tank and stole data from a casino In late 2016, Crash Override malware took down the power grid in Kiev, Ukraine for over an hour before Christmas Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world 3

The Solution: IOT Armour, a next-gen security solution designed explicitly for connected devices and critical infrastructure The platform leverages digital signature based identity and authentication for humans, machines and data; securing connected devices and tightly ring-fencing critical infrastructure IOT Armour delivers an enhanced Software- Defined Perimeter using private permissioned Blockchain and TLS technology 4

IOT Armour harnesses digital signatures to identify, authenticate and authorize devices thereby also securing IoT Communication INTERNET OF THINGS REGISTRATION and ID of new device Identity & Access Validation Nodes AUTHENTICATION & AUTHORIZATION of devices SECURE CHANNELS for inter-device communication CORE SYSTEMS SECURED ACCESS to core systems Identity & Access Validation Nodes The solution utilizes Blockchain-based digital signatures to secure connected devices as well as the communication channels 5

The Building Blocks: IOT Armour is powered by Software Defined Perimeter (SDP) architecture & Blockchain technology SDP architecture render devices invisible to attackers; and customized agents along with Blockchain technology delivers a new breed of digital identity and access control for connected devices in the IoT Software Defined Perimeter (SDP) Decentralization 1. Centralized Controller 3. Mutual secure comm. to Controller SDP Controller 4. List of authorized Accepting Hosts determined 5. Accept communication from Initiating Host Cryptographic Encryption 6. Receive list of IP s of Accepting Hosts Initiating SDP Host Control Channel Data Channel 7. Mutual secure comm. channels Accepting SDP Host 2. Mutual secure comm. to Controller Accepting SDP Host Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD Immutability Consensus-based Control Blockchain Technology Emerging technology offers opportunities to secure sensor networks, IoT devices and smart infrastructure in bold new ways 6

IOT Armour s Zero Trust setup allows for micro segmentation of connected devices as well as associated users The platform facilitates fine-grained resources access and comprehensive management of the policy engine on the Blockchain 7

The Result: A next-gen military-grade security system to protect connected devices and critical infrastructure against cyber threats Cryptographically-secure digital identity for users, connected devices and central servers/ services Invisible & locked down critical systems with micro segmentation and fine-grain access control Best-in-class militarygrade encryption for secured access to connected devices and IoT communication Immutable & tamperproof logs stored securely on the Blockchain for instant access / analysis It s time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology! 8

Reach Us Learn how you can secure IoT devices and critical systems with Blockchain-enabled next gen cybersecurity Drop us a line or reach us via any of the channels below: www.blockarmour.com +91 9820386446 +65 96536243 info@blockarmour.com @blockarmour IOT Armour is a product by award-winning cybersecurity venture, Block Armour 9