Copyright 2017 Ford Motor Company, All Rights Reserved

Similar documents
SECURING THE CONNECTED ENTERPRISE.

Introduction to Device Trust Architecture

IBM Future of Work Forum

The Internet of Things. Presenter: John Balk

Automotive Cyber Security

Transforming the Network for the Digital Business

The Oracle Trust Fabric Securing the Cloud Journey

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Digital Network Architecture

The Windstream Enterprise Advantage for Banking

Achieving End-to-End Security in the Internet of Things (IoT)

Implementing security has never been easier. Infineon Security Partner Network.

National Institute of Standards and Technology

Building a Better Mousetrap:

Privacy Challenges in Big Data and Industry 4.0

accelerate your ambition Chris Jenkins

Secure Product Design Lifecycle for Connected Vehicles

Connected & Autonomous vehicles

IoT & SCADA Cyber Security Services

Open Digital: The Digital Services Opportunity Explored

Angela McKay Director, Government Security Policy and Strategy Microsoft

align security instill confidence

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Smart Cities & The 4th Industrial Revolution

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

Altitude Software. Data Protection Heading 2018

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

DIGITAL TRUST Making digital work by making digital secure

IBM Cloud Internet Services: Optimizing security to protect your web applications

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

Innovation policy for Industry 4.0

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

Standards for V2X Communication and Implications for OEMs and ITS

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

Cisco Smart+Connected Communities

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Strong Security Elements for IoT Manufacturing

Internet of Things Security standards

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

New Digital Business Models Driving the Softwarization of the Network

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM

Cisco Start. IT solutions designed to propel your business

Copyright 2011 Trend Micro Inc.

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

The Nasuni Security Model

SGS CYBER SECURITY GROWTH OPPORTUNITIES

AT&T Endpoint Security

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Cyber Security in Smart Commercial Buildings 2017 to 2021

Internet of Things Toolkit for Small and Medium Businesses

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Data Management and Security in the GDPR Era

Run the business. Not the risks.

Retail Security in a World of Digital Touchpoint Complexity

Who s Protecting Your Keys? August 2018

NEXT GENERATION SECURITY OPERATIONS CENTER

The SD-WAN security guide

Mitigating Security Breaches in Retail Applications WHITE PAPER

CHALLENGES GOVERNANCE INTEGRATION SECURITY

The Integrated Smart & Security Platform Powered the Developing of IOT

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

Overcoming Business Challenges in WAN infrastructure

MAXIMIZE YOUR IOT INVESTMENT WITH SCALABLE SOLUTIONS FROM AWS AND NXP

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

European Union Agency for Network and Information Security

Accelerate Your Enterprise Private Cloud Initiative

Converged Cloud and Digital Transformation: A Strategy for Business Success

Securing global enterprise with innovation

Consolidated Edition. 5th Annual State of Application Security Report Perception vs. Reality

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Internet of Things: Driving the Transformation

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Total Threat Protection. Whitepaper

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

The threat landscape is constantly

Cybersecurity Lessons learned from the energy sector. Reach a safe harbour. Obtaining knowledge. Summary. Challenges and opportunities

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Securing Your Most Sensitive Data

21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation

STRATEGIC PLAN

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead

Securing the future of mobility

C O M P E T E A T Y O U R P E A K

Securing intelligent networks: a guide for CISO and CIOs

MOVE TO A FLEXIBLE IT MODEL ENTERPRISE DATA CENTER SOLUTIONS.

Accelerating High Performance Manufacturing

How to Create, Deploy, & Operate Secure IoT Applications

May 9, 2016 Innovation for Good: Opportunities, Challenges and Imperatives. Terry Kramer 2016

White Paper. Connected Car Brings Intelligence to Transportation

Mobile Edge Computing

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Transcription:

- Research Analyst Digitization - IT Research and Innovation - PhD Candidate University of Michigan Dearborn - Machine Learning in Automotive Security - Vice Chair - IEEE SEM

01 02 03 04 05 Intro Ford and Smart Mobility, IoT Opportunity IoT Security Smart Things, IoT Framework, IoT Vulnerabilities IoT Foundation Security Device, Network, Application, Privacy, People Data and Privacy Access and control Smart Living Implications, Art of the possible, IoT Security Puzzle Reference: pixabay.com

SYNC Connect Apple Car Play, Android Auto AppLink Expansion SmartDeviceLink partners Ford Credit Link GoDrive, GoRide, GoPark Multi-modal mobility solutions Techstarts Mobility challenge Bike sharing, City solutions Tripling Autonomous fleet Added testing (M-City, CA) Velodyne collaboration Snow testing Investment in Argo.AI, SAIPS, Nirenberg Neuroscience FordPass Amazon Echo Lincoln Miles GDI&A IBM partnership Pivotal partnership Ford products are shifting toward an expanding view of customer experiences

Consolidating brands while expanding product diversity Reference: media.ford.com

100,000 parts 67 manufacturing sites 24.9M meters 3 water/year 201,000 employees 12,000 dealers worldwide manufactured 14.6B Kilowatt hours/year 15M vehicles with SYNC 6.6M vehicles sold/year $110B spend on operations New and existing customers, employees, and supplies are part of our sustainability ecosystem Reference: 2016 Annual Report, 2015-2016 Sustainability at Ford Report

Fusing processes Security and devices Smart water management Employee Security productivity Customer Experience Supply Security Chain Integration Smart resource Security management Connected Security consumer New revenue streams Efficient Security operations IoT is a common opportunity across all of our domains

Connected Intelligent Insightful Actionable Smart: Improving people s quality of life and capabilities Reference: pixabay.com

People Analytics Application Security Network Smart Things (Device)

People Malicious Intent Internal Threat Introduction Easy, unobtrusive identity management Analytics I5 Privacy Concerns I6 Insecure Cloud Interface Application Network I1 Insecure Web Interface I2 Insufficient Authentication/Authorization I7 Insecure Mobile Interface I3 Insecure Network Services I4 Lack of Transport Encryption OWASP Top 10 Things (Device) I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security Reference: www.owasp.org Open Web Application Security Project Copyright 2017 Ford Motor Company, All Rights Reserved

Encryption Authentication Computing Power Secure Booting Root of Trust Power Limitation Interoperability Hardware Acceleration for cryptographic operations Key management Things Network Application Analytics People Reference: pixabay.com Copyright 2017 Ford Motor Company, All Rights Reserved

Lots of devices (46B by 2021) Bandwidth Firewall Bring your own smart thing Updates Control Access Authentication Intrusion Detection Density of the network traffic Things Network Application Analytics People Reference: shapingtomorrow.com, pixabay.com Copyright 2017 Ford Motor Company, All Rights Reserved

Management Cryptographic Storage Restriction and access Information Leakage Injection Malicious File Execution Things Network Application Analytics People Reference: pixabay.com Copyright 2017 Ford Motor Company, All Rights Reserved

Control Privacy Legal requirements Profiling Information Linkage Lifecycle transitions Legislation Evolving Technologies Interoperability Tracking Inventory Attack Network Interrogation Identification Things Network Application Analytics People Reference: pixabay.com Copyright 2017 Ford Motor Company, All Rights Reserved

Profiling Intent identification Privacy-violating interactions Privacy compliance Anonymization Detect hacker behavior Identification Instruction detection Prevention Intuitive and robust Things Network Application Analytics People Reference: pixabay.com Copyright 2017 Ford Motor Company, All Rights Reserved

Smart Thing Not scalable for expected IoT growth Reference: EmpowerID white paper

Smart Things IoT Security Solutions might be a hybrid between RBAC and ABAC Reference: EmpowerID white paper

Data Ownership Digital Activity Control Privacy Identify Management Secure In control Empowered Efficient Productive Connected Experienced Access Security Smart: Improving people s quality of life and capabilities

Contextual Security Data Governance Embedded Security People s Intent Network Segmentation Physical Security Threat Detection Privacy Access Ubiquitous Identity Management

Examples Intelligent Interactions Analytics Devices I see, I know I act meaningfully and proactively I see I know I understand I see I know Applications Personal Home Vehicles Enterprise Industrial Internet Platform and Enablement Building Blocks Hardware Software Connectivity Partners Reference: http://mattturck.com Leading companies are investing in capabilities to deliver IoT intelligent interactions and personalized experiences while offering robust security solutions

Smart Living requires IoT Security IoT Security is a contextual and inherited problem amplified by IoT OEM s are contending for presence in the 46B connected things by 2021 Cyber attacks could cost businesses and individual up to $90 Trillion Public perception of privacy and security failures has an impact on business vitality Security needs to became subtle in the background but with more robust capabilities without being intrusive Industry is looking for solutions to address challenges described in this presentation Reference: shapingtomorrow.com