SECURING THE CONNECTED ENTERPRISE.

Similar documents
Securing Digital Transformation

iotrust Security Solutions

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

Copyright 2017 Ford Motor Company, All Rights Reserved

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

5G Security. Jason Boswell. Drew Morin. Chris White. Head of Security, IT, and Cloud Ericsson North America

SGS CYBER SECURITY GROWTH OPPORTUNITIES

Run the business. Not the risks.

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Secure Product Design Lifecycle for Connected Vehicles

THE POWER OF TECH-SAVVY BOARDS:

Angela McKay Director, Government Security Policy and Strategy Microsoft

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Sales Presentation Case 2018 Dell EMC

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

Innovation policy for Industry 4.0

Converged Cloud and Digital Transformation: A Strategy for Business Success

Transforming IT: From Silos To Services

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Building a Resilient Security Posture for Effective Breach Prevention

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Data Management and Security in the GDPR Era

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Morgan Stanley Digital Day. London, March

Strong Security Elements for IoT Manufacturing

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

IoT & SCADA Cyber Security Services

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

align security instill confidence

Why you should adopt the NIST Cybersecurity Framework

Cisco Connected Factory Accelerator Bundles

AT&T Endpoint Security

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

Digital Trust Ecosystem

MITIGATE CYBER ATTACK RISK

Digitalization of Manufacturing

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Security in India: Enabling a New Connected Era

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Identity-Based Cyber Defense. March 2017

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

The Oracle Trust Fabric Securing the Cloud Journey

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

to Address Cyber Physical Systems Security (CPSSEC)

Toward Energy Data Platform in Korea

Internet of Things Toolkit for Small and Medium Businesses

How to Create, Deploy, & Operate Secure IoT Applications

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Securing Your Digital Transformation

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Mitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment

Cybersecurity Session IIA Conference 2018

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Cybersecurity. Securely enabling transformation and change

IoT with 5G Technology

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Google on BeyondCorp: Empowering employees with security for the cloud era

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Retail Security in a World of Digital Touchpoint Complexity

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

THALES DATA THREAT REPORT

The Internet of Things. Presenter: John Balk

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead

Best Practices in Securing a Multicloud World

The impact of digital transformation on industries

Implementing security has never been easier. Infineon Security Partner Network.

Standards for V2X Communication and Implications for OEMs and ITS

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Securing the future of mobility

Digital Network Architecture

CONE 2019 Project Proposal on Cybersecurity

Wireless e-business Security. Lothar Vigelandzoon

5 Steps to Government IT Modernization

FOR FINANCIAL SERVICES ORGANIZATIONS

Intelligent Building and Cybersecurity 2016

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

Samu Konttinen, CEO Q4 / 2017 CORPORATE SECURITY REVENUE GROWTH ACCELERATED TO 16%

The Future of Mobility. Keith Kressin Senior Vice President, Product Management Qualcomm Technologies,

Accelerate Your Enterprise Private Cloud Initiative

Internet of Things Security standards

CipherCloud CASB+ Connector for ServiceNow

PROTECTING BRANDS IN CYBERSPACE

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Leading our discussion today

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Transcription:

SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES

EVERYTHING WAS FINE

THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE OF DEVICES SENSORS HACKED PRIVACY ATTACK RECALL OF 1.4 MILLION JEEPS JET THURSTERS OUT OF CONTROL LIGHTS WENT OUT ENDLESS START OF SYSTEMS NOT SO STRONG STEEL

THE RISE OF IOT 8.4 BILLION DEVICES $168 BILLION SPENDING 2020 BY 2020, MORE THAN 25% OF IDENTIFIED ATTACKS IN ENTERPRISES 20 BILLION DEVICES 6.4 BILLION DEVICES WILL INVOLVE THE IOT, ALTHOUGH THE $137 BILLION SPENDING 2018 IOT WILL ACCOUNT FOR LESS THAN 2017 10% OF IT SECURITY BUDGETS. $295 BILLION SPENDING 2016 11 BILLION DEVICES $210 BILLION SPENDING *SOURCE : GARTNER REPORT & IOT ANALYTICS 2018 4

HARMAN AT THE CENTER OF DELIVERING CONNECTED EXPERIENCES EMPLOYEES 35,000 COUNTRIES 30+ BRANDS 16+ HARMAN BUSINESSES CONNECTED SERVICES LIFESTYLE AUDIO CONNECTED CAR PROFESSIONAL SOLUTIONS PLATFORMS CLOUD COMPUTING ANALYTICS AI IOT TECHOPS MOBILITY OTA Leading Global R&D services provider Rated as leading IOT, Cyber Security, Communications & Digital Services New-age Technology Focus: AI, ML, Conversational UX, AR, VR Asset-led GTM PREMIUM BRANDED AUDIO SOUND MANAGEMENT S/W FOR CAR, HOME AND ON-THE-GO Largest supplier of premium branded audio solutions JBL, HARMAN-KARDON, MARK LEVINSON, AKG ++ NAVIGATION MULTIMEDIA CONNECTIVITY TELEMATICS SAFETY AND SECURITY Market leader in connected car solutions to the world s automakers Powering 8 of the 10 most reliable cars globally AUDIO-LIGHTING VIDEO SWITCHING AUTOMATION FOR ENTERPRISE & ENTERTAINMENT World's largest professional audio, lighting, video and control products and systems company Microsoft Sprint KDDI Nielsen Official Audio Partner Grammys and NBA Audi Mercedes Benz BMW Madison Square Garden City Center, Vegas GLOBAL LEADER IN AUDIO, CLOUD, MOBILITY, ANALYTICS, COGNITIVE, IOT SERVICES & PRODUCTS

HARMAN CONNECTED SERVICES GLOBAL LEADER IN CONNECTED, INTELLIGENT, AUGMENTED & CONVERSATIONAL PRODUCTS IOT, OTA, CYBERSECURITY AR, VR, MIXED REALITY, UX DESIGN AI, ML, COGNITIVE CONVERSATIONAL UX, NLP INTELLIGENT EDGE DEVICES, CLOUD, PLATFORMS, API s AUTOMOTIVE COMMUNICATION DIGITAL HEALTH HITECH 10000+ GLOBAL R&D TALENT

THE CONNECTED ENTERPRISE : CONVERGENCE OF IT + OT Information Technology Operational Technology ERP CRM Demand Management Financial Planning Network Optimization Costs State Orders Location Constraints Conditions Specifications Events Context Visualization Control Systems Smart Machine Location Systems Environment Sensors Barcodes/ RFID Prediction Monitoring Smart Manufacturing Smart Cities Connected Vehicles Smart Agriculture Smart Grids Connected Homes Connected Fitness

IOT OR INTERNET OF VULNERABLE THINGS INSECURE WEB INTERFACE INSECURE NETWORK SERVICES PRIVACY CONCERNS INEFFECTIVE AUTHENTICATION/AUTHORIZATION LACK OF TRANSPORT ENCRYPTION INSECURE CLOUD INTERFACE INSECURE DEVICE INTERFACE INSUFFICIENT SECURITY FEATURES INSECURE SOFTWARE/FIRMWARE ERASING ALL PERSONAL INFORMATION 11

CALL FOR EXPANSION OF SECURITY NEEDS INCREASED ATTACK SURFACE THREAT DIVERSITY IMPACT AND RISK REMEDIATION PROTOCOLS COMPLIANCE AND REGULATION Converged, Managed Network Resilience at Scale Security Distributed Intelligence Application Enablement 12

SUCCESSFUL STEPS IN SECURING IOT C-level visibility of service level risks & Infrastructure vulnerabilities Process maturity & compliance Securing network edge devices, and cloud operations Managed security services SecOps and Security Testing (penetration etc) Device reverse engineering and due diligence Improved logging within standard Security devices to interact with a multitude of network protocols Continuous Defense to limit the attack surface Government Regulations and Liabilities for Consumer Devices 13

WATCHDOG TECHNOLOGIES AT HARMAN Identify & Trust Communication Entrust Data Card Castanet IoT Endpoint Mgmt Vulnerability Marimba & Redbend Clarinet Compliance Others Logsight AI, Bigdata, Analytics 14

PARTNERING FOR SUCCESS HARMAN engineering capabilities in IoT domain HARMAN product and vertical industry expertise Entrust Datacard security offering and experience Entrust Datacard security brand and track record Collaborative team to accelerate opportunities in IOT

IOTRUST: COMPELLING IOT SECURITY SOLUTION PRE-INTEGRATED OFFERINGS Cloud ready, Application and Data platform agnostic Integrated Device and Data Security Identity Management: Manufacturing to Operations iotrust Value: Delivering secured infrastructure between things and applications Enabling different classes of things existing or greenfield Authentication and Authorization for every class of device Data Acquisition Management STREAMLINED DEPLOYMENT FOR BUSINESS OUTCOMES STRONG SECURITY ALIGNED WITH OPERATIONS REQUIREMENTS SCALABLE AND ALIGNED TO EVOLVING ECOSYSTEM Supply Chain Integrity Secure Auto Enrollment and Provisioning

QUESTIONS? 18