IOT Devices Expanding Your
Level of Presence (and Your
Digital Risk Footprint)
Today’s Speakers
Adam Meyer
Chief Security Strategist
SurfWatch Labs
2
Kristi Horton
Chief Security Strategist
Gate 15 & Real Estate ISAC
Understanding the
IoT Security Challenge
3
• Network-enabled or "smart"
IOT devices are
commonplace
• The potential of having
numerous devices per
building potentially
translates into the largest
digital footprint that is NOT
under proper security
management
Classes of IoT Devices
Operational Technology
• Home and Building Automation: Remote
management, smart appliances
• Smart Energy: Climate control, smart meters,
smart plugs, smart light bulbs
• Security and Safety: Cameras, doors, etc.
• Multimedia: Smart TVs, DVRs, voice
automation (i.e. Alexa, Echo, Siri), etc.
• Industrial Infrastructure
Information Technology
• Mobile Devices: iPads, iPhones, Android phones
and tablets
• Wearables: Activity trackers, heart rate, breathing
rate, Smart watches
4
The Age of the “Smart” Building
5
• The more IoT-enabled
devices and the greater
the interconnectivity
between various building
systems, the more
detailed and sensitive the
data that will be captured.
• According to IDC
forecasts, 40 percent of
the information in the
digital universe requires
some level of protection,
but only half of that data
is protected.
Your Expanding Digital Footprint
I.e. LED lighting, HVAC and
physical security systems, will
take the lead as connectivity is
driven into higher-volume,
lower cost devices
6
I.e. Smart meters and specific industry
devices such as manufacturing field
devices, process sensors for electrical
generating plants and real-time
location devices for healthcare
Trending IoT Targets
From the Last Year
7
IoT Threat Examples
8
Chinese Hacking of US Chamber of
Commerce includes IoT Devices
- Reported in Dec 2011
• Chamber of Commerce thermostat was
communicating with a computer in China
• Another time, chamber employees were
surprised to see one of their printers printing in
Chinese
IoT Threat Examples
9
Rise of the IoT Botnets
• Proliferation of devices
• DDoS attacks
• Ease of weaponization –
ala Mirai, which
weaponizes vulnerable IoT
devices
Distribution of Mirai Botnet in October attack
IoT Botnets Driving a Surge in
Service Interruption
10
The percent of negative CyberFacts related to “service interruption” surged in the fourth
quarter of 2016 due to attacks and concern around Mirai and other IoT-powered botnets.
Latest IoT Threat
11
Imeij IoT Malware Targets
AVTech Devices
• ELF_IMEIJ.A, aka Imeij leverages the
RFI exploit
• Targets Linux-based ARM devices and
gathers info on the infected device,
sends it to a remote server and launches
DDoS attacks on demand
• Botnet operators can also clean the
device and remove the malware
• 130,000+ AVTech devices currently
exposed online
What’s Next for IoT Threats?
12
The Security Challenge Will
Only Increase as More IoT
Devices are Used
• Many organizations don’t have a good
handle on their level of presence
- DDoS attacks will continue until they
become less successful (Cybercriminals
follow the path of least resistance and
most money)
- Cybercriminals are always looking for new
opportunities
• As-a-service attack capabilities for sale on
the Dark Web right now
What You Should Do to Reduce Your
Uncontrolled IoT Footprint
13
Designate Clear Ownership
and Accountability
• Who owns IoT devices?
- Single owner?
- Shared owner via more agile
DevOps model?
• Who else should be involved in
management of these devices?
- IT?
- Security?
- Facilities?
What You Should Do to Reduce Your
Uncontrolled IoT Footprint
14
Define and Enforce IoT
Management Policies
• Treat “smart” devices (i.e. smart light bulb) as
an IT asset that is networked
• Define and enforce what data needs to be
kept secure and the devices that interact, use
or store that data
• Segment your network to minimize impact of a
breach and for resiliency purposes
- Think about the payload delivery of malware
(opportunity) – path of least resistance to achieve
a level of presence
- Adversaries gain access in a non-vital zone and
pivot into a vital zone
What You Should Do to Reduce Your
Uncontrolled IoT Footprint
15
Things You Can Do Now … So
You’re Not Overwhelmed Later
• Take stock of your software and devices
• Leverage security solutions that can:
- Monitor network protocols and Internet
traffic for threats
- Proactively detect malware at the endpoint
• Stay current and aware of relevant cyber
threats within this technology area and ensure
you have visibility of risks within your digital
supply chain and your business
• Incorporate IoT security risks into your
incident response and legal processes
Q&A and Additional
SurfWatch Labs Resources
16
SurfWatch Cyber Advisor:
www.surfwatchlabs.com/cyber-advisor
SurfWatch Threat Analyst:
www.surfwatchlabs.com/threat-intel
Dark Web Intelligence:
www.surfwatchlabs.com/dark-web-intelligence
Personalized SurfWatch Demo:
info.surfwatchlabs.com/request-demo
Strategic and Operational Threat Intelligence

More Related Content

PPTX
Principals of IoT security
PDF
TOP 6 Security Challenges of Internet of Things
PDF
Cyber Security - ICCT Colleges
PDF
IOT Security - ICCT College of Engineering
PPTX
Iot Security, Internet of Things
PPTX
Security challenges for internet of things
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
PDF
The Internet of Things: Privacy and Security Issues
Principals of IoT security
TOP 6 Security Challenges of Internet of Things
Cyber Security - ICCT Colleges
IOT Security - ICCT College of Engineering
Iot Security, Internet of Things
Security challenges for internet of things
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
The Internet of Things: Privacy and Security Issues

What's hot (20)

PPTX
Privacy and Security in the Internet of Things
PPT
IoT security (Internet of Things)
PDF
The shift from social network security to the social iot security
PDF
Security in Internet of Things(IoT) Ecosystem
PPTX
Cyber security basics
PPTX
IoT security presented in Ada's List Conference
PPTX
Internet of things –
PPTX
Cybersecurity-Real World Approach FINAL 2-24-16
PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
PDF
Wearable Technology for Enhanced Security.
PPTX
Security of iot device
PPTX
Ch 04 wireless security
PDF
Security challenges for IoT
PPTX
NCSAM = Cyber Security Awareness Month: Trends and Resources
PPTX
Network security
PPTX
Cyber security
PDF
Cyber Security - Flier
PDF
Cybersecurity
PPTX
Cyber Security
Privacy and Security in the Internet of Things
IoT security (Internet of Things)
The shift from social network security to the social iot security
Security in Internet of Things(IoT) Ecosystem
Cyber security basics
IoT security presented in Ada's List Conference
Internet of things –
Cybersecurity-Real World Approach FINAL 2-24-16
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
Wearable Technology for Enhanced Security.
Security of iot device
Ch 04 wireless security
Security challenges for IoT
NCSAM = Cyber Security Awareness Month: Trends and Resources
Network security
Cyber security
Cyber Security - Flier
Cybersecurity
Cyber Security
Ad

Viewers also liked (20)

PDF
Machine Learning/ Data Science: Boosting Predictive Analytics Model Performance
PPTX
IoT Mashup - Security for internet connected devices - Lyle
PDF
STSAFE-A: certified security for IoT devices and services
PDF
Building IoT devices for fun and profit - Mobile Era 2016
PPTX
Practical Security Assessments of IoT Devices and Systems
PPTX
Beyond the Hype: Security Experts Weigh in on Artificial Intelligence, Machin...
PDF
IoT and physical security of medical devices
PDF
Using APIs to Program Disparate IoT Devices
PPTX
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
PDF
White Paper: IoT Security – Protecting the Networked Society
PDF
GetShift - IoT Devices Done Right.
PPTX
IOT based smart security and monitoring devices for agriculture
PDF
1.1.7 Система огнестойких проходок Vulcan
PPTX
Betaleadership De Gestores de Recursos Humanos a Makers de Interacciones Humanas
DOCX
oyene safety cv
PPTX
Miten markkinoinnin automaation käyttöönotto aloitti tekijöitään suuremman mu...
PDF
1.1.9 Система Angara и дренажные трубы
PDF
Brochure eventos Spiwak
PDF
Auto del Tribunal Supremo. Sala Cuarta.
PPT
Active Procrastination
Machine Learning/ Data Science: Boosting Predictive Analytics Model Performance
IoT Mashup - Security for internet connected devices - Lyle
STSAFE-A: certified security for IoT devices and services
Building IoT devices for fun and profit - Mobile Era 2016
Practical Security Assessments of IoT Devices and Systems
Beyond the Hype: Security Experts Weigh in on Artificial Intelligence, Machin...
IoT and physical security of medical devices
Using APIs to Program Disparate IoT Devices
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
White Paper: IoT Security – Protecting the Networked Society
GetShift - IoT Devices Done Right.
IOT based smart security and monitoring devices for agriculture
1.1.7 Система огнестойких проходок Vulcan
Betaleadership De Gestores de Recursos Humanos a Makers de Interacciones Humanas
oyene safety cv
Miten markkinoinnin automaation käyttöönotto aloitti tekijöitään suuremman mu...
1.1.9 Система Angara и дренажные трубы
Brochure eventos Spiwak
Auto del Tribunal Supremo. Sala Cuarta.
Active Procrastination
Ad

Similar to IoT Devices Expanding Your Digital Footprint (20)

DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PDF
IoT, Security & the Path to a Solution
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPTX
IoT and the industrial Internet of Things - june 20 2019
PPTX
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
PDF
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
PPTX
Assign 1_8812814ctm.pptx
PPTX
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
PPTX
IoT-Device-Security-DRAFT-slide-presentation
PPTX
IoT -Internet of Things
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PPTX
IoT security
PDF
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
PDF
Securing the internet of things opportunity putting cybersecurity at the hear...
PDF
Dissecting internet of things by avinash sinha
PDF
Internet of Things - Privacy and Security issues
PDF
Safeguarding the Internet of Things
PDF
Embracing iot in the enterprise
PPTX
itmsday2.pptx
PPTX
IoT-Device-Security.pptx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT, Security & the Path to a Solution
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT and the industrial Internet of Things - june 20 2019
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
Assign 1_8812814ctm.pptx
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...
IoT-Device-Security-DRAFT-slide-presentation
IoT -Internet of Things
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
IoT security
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the internet of things opportunity putting cybersecurity at the hear...
Dissecting internet of things by avinash sinha
Internet of Things - Privacy and Security issues
Safeguarding the Internet of Things
Embracing iot in the enterprise
itmsday2.pptx
IoT-Device-Security.pptx

More from SurfWatch Labs (20)

PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
PPTX
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
PPTX
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
PPTX
How to Mitigate Risk From Your Expanding Digital Presence
PPTX
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
SurfWatch Labs Threat Intelligence Solution Demo
PPTX
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
PPTX
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
PPTX
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
PPTX
Shining a Light on Cyber Threats from the Dark Web
PPTX
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
PPT
Treat Cyber Like a Disease
PPTX
SANS Report: The State of Security in Control Systems Today
PPT
Point of Sale Insecurity: A Threat to Your Business
PPTX
Using Threat Information to Build Your Cyber Risk Intelligence Program
PPT
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Using SurfWatch Labs' Threat Intelligence to Monitor Your Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
How to Mitigate Risk From Your Expanding Digital Presence
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
SurfWatch Labs Threat Intelligence Solution Demo
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Cyber Threat Intelligence: Knowing What Specific Threats Your Business Should...
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Shining a Light on Cyber Threats from the Dark Web
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Treat Cyber Like a Disease
SANS Report: The State of Security in Control Systems Today
Point of Sale Insecurity: A Threat to Your Business
Using Threat Information to Build Your Cyber Risk Intelligence Program
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Unlock new opportunities with location data.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
August Patch Tuesday
PPTX
Tartificialntelligence_presentation.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
What is a Computer? Input Devices /output devices
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
The various Industrial Revolutions .pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
sustainability-14-14877-v2.pddhzftheheeeee
Unlock new opportunities with location data.pdf
1 - Historical Antecedents, Social Consideration.pdf
Assigned Numbers - 2025 - Bluetooth® Document
A novel scalable deep ensemble learning framework for big data classification...
August Patch Tuesday
Tartificialntelligence_presentation.pptx
WOOl fibre morphology and structure.pdf for textiles
Zenith AI: Advanced Artificial Intelligence
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hindi spoken digit analysis for native and non-native speakers
Module 1.ppt Iot fundamentals and Architecture
A comparative study of natural language inference in Swahili using monolingua...
What is a Computer? Input Devices /output devices
CloudStack 4.21: First Look Webinar slides
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
observCloud-Native Containerability and monitoring.pptx
Enhancing emotion recognition model for a student engagement use case through...

IoT Devices Expanding Your Digital Footprint

  • 1. IOT Devices Expanding Your Level of Presence (and Your Digital Risk Footprint)
  • 2. Today’s Speakers Adam Meyer Chief Security Strategist SurfWatch Labs 2 Kristi Horton Chief Security Strategist Gate 15 & Real Estate ISAC
  • 3. Understanding the IoT Security Challenge 3 • Network-enabled or "smart" IOT devices are commonplace • The potential of having numerous devices per building potentially translates into the largest digital footprint that is NOT under proper security management
  • 4. Classes of IoT Devices Operational Technology • Home and Building Automation: Remote management, smart appliances • Smart Energy: Climate control, smart meters, smart plugs, smart light bulbs • Security and Safety: Cameras, doors, etc. • Multimedia: Smart TVs, DVRs, voice automation (i.e. Alexa, Echo, Siri), etc. • Industrial Infrastructure Information Technology • Mobile Devices: iPads, iPhones, Android phones and tablets • Wearables: Activity trackers, heart rate, breathing rate, Smart watches 4
  • 5. The Age of the “Smart” Building 5 • The more IoT-enabled devices and the greater the interconnectivity between various building systems, the more detailed and sensitive the data that will be captured. • According to IDC forecasts, 40 percent of the information in the digital universe requires some level of protection, but only half of that data is protected.
  • 6. Your Expanding Digital Footprint I.e. LED lighting, HVAC and physical security systems, will take the lead as connectivity is driven into higher-volume, lower cost devices 6 I.e. Smart meters and specific industry devices such as manufacturing field devices, process sensors for electrical generating plants and real-time location devices for healthcare
  • 7. Trending IoT Targets From the Last Year 7
  • 8. IoT Threat Examples 8 Chinese Hacking of US Chamber of Commerce includes IoT Devices - Reported in Dec 2011 • Chamber of Commerce thermostat was communicating with a computer in China • Another time, chamber employees were surprised to see one of their printers printing in Chinese
  • 9. IoT Threat Examples 9 Rise of the IoT Botnets • Proliferation of devices • DDoS attacks • Ease of weaponization – ala Mirai, which weaponizes vulnerable IoT devices Distribution of Mirai Botnet in October attack
  • 10. IoT Botnets Driving a Surge in Service Interruption 10 The percent of negative CyberFacts related to “service interruption” surged in the fourth quarter of 2016 due to attacks and concern around Mirai and other IoT-powered botnets.
  • 11. Latest IoT Threat 11 Imeij IoT Malware Targets AVTech Devices • ELF_IMEIJ.A, aka Imeij leverages the RFI exploit • Targets Linux-based ARM devices and gathers info on the infected device, sends it to a remote server and launches DDoS attacks on demand • Botnet operators can also clean the device and remove the malware • 130,000+ AVTech devices currently exposed online
  • 12. What’s Next for IoT Threats? 12 The Security Challenge Will Only Increase as More IoT Devices are Used • Many organizations don’t have a good handle on their level of presence - DDoS attacks will continue until they become less successful (Cybercriminals follow the path of least resistance and most money) - Cybercriminals are always looking for new opportunities • As-a-service attack capabilities for sale on the Dark Web right now
  • 13. What You Should Do to Reduce Your Uncontrolled IoT Footprint 13 Designate Clear Ownership and Accountability • Who owns IoT devices? - Single owner? - Shared owner via more agile DevOps model? • Who else should be involved in management of these devices? - IT? - Security? - Facilities?
  • 14. What You Should Do to Reduce Your Uncontrolled IoT Footprint 14 Define and Enforce IoT Management Policies • Treat “smart” devices (i.e. smart light bulb) as an IT asset that is networked • Define and enforce what data needs to be kept secure and the devices that interact, use or store that data • Segment your network to minimize impact of a breach and for resiliency purposes - Think about the payload delivery of malware (opportunity) – path of least resistance to achieve a level of presence - Adversaries gain access in a non-vital zone and pivot into a vital zone
  • 15. What You Should Do to Reduce Your Uncontrolled IoT Footprint 15 Things You Can Do Now … So You’re Not Overwhelmed Later • Take stock of your software and devices • Leverage security solutions that can: - Monitor network protocols and Internet traffic for threats - Proactively detect malware at the endpoint • Stay current and aware of relevant cyber threats within this technology area and ensure you have visibility of risks within your digital supply chain and your business • Incorporate IoT security risks into your incident response and legal processes
  • 16. Q&A and Additional SurfWatch Labs Resources 16 SurfWatch Cyber Advisor: www.surfwatchlabs.com/cyber-advisor SurfWatch Threat Analyst: www.surfwatchlabs.com/threat-intel Dark Web Intelligence: www.surfwatchlabs.com/dark-web-intelligence Personalized SurfWatch Demo: info.surfwatchlabs.com/request-demo Strategic and Operational Threat Intelligence