SlideShare a Scribd company logo
IoT Security Patterns
Mark Benson, CTO
@markbenson
The IoT opportunity
Recent Economist survey:
Expect their company to be
using IoT within 3 years
“IoT is our single biggest
threat AND biggest
opportunity over the next 10
years” – Brand-name fortune
500 board of directors
*Source: ABI Research, Cisco, Craig Hallum Estimates
0
2
4
6
8
10
12
14
16
18
20
$0
$50
$100
$150
$200
$250
DevicesBillions
MarketSizeBillions
Big Data Analytics (53%
CAGR)
Connected Device Platforms
(33% CAGR)
Platforms (33% CAGR)
Application Enablement
Platforms (32% CAGR)
Value Added Services (26%
CAGR)
System Integration Services
(24% CAGR)
Hardware (23% CAGR)
Connectivity (12% CAGR)
Internet-connected devices
(Cisco Estimate)
95%
The Internet of Things?
More like the Internet of Attack
Vectors
• Attack surfaces are expanding rapidly
• Physical access to systems is becoming easier
• Consumer privacy concerns are rising
• Consequences of a breach are becoming more severe (critical
infrastructure, brand deterioration, data privacy issues, etc.)
• Product companies are being forced outside of their comfort
zones
• Three dimensions that make IoT security challenging…
1. Resource constraints
2. Deployment topologies
3. Usage modes
Things to note about IoT usage modes that affect security:
1. Some modes are normal and standard solutions exist
2. Some modes are new and standards are still emerging
3. Some modes are becoming more vulnerable due to resource constraints
The IoT security problem area
A. High resource constraints
B. Complex deployment topologies
C. Novel usage modes
Mo’ IoT, mo’ problems
The 4th dimension: time
Now we have a Tesseract
The difficulty with IoT security is that
the landscape is constantly changing,
even after products are deployed
Security should be designed for from
the beginning and embraced as a
journey throughout
It starts with a process…
The web you should be weaving
Secure processes => secure products => secure brand integrity
Conclusion
Takeaways:
1. Security processes. Have a security architecture from the beginning and
evolve throughout (layers, topologies, modes)
2. Technology selection. Start it from the beginning and evolve thoughout
3. Operations planning. How do you respond if/when a security incident occurs
in the field. Use checklists
– http://owasp.org/
– http://builditsecure.ly/
Embrace the journey
Thank you
Mark Benson
@markbenson

More Related Content

PPTX
Iot(security)
PDF
IOT Security
PPTX
IoT security
PPTX
IoT Security Awareness Training : Tonex Training
PDF
IoT Security and Privacy Considerations
PPTX
Iot Security, Internet of Things
PPTX
Privacy and security in IoT
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Iot(security)
IOT Security
IoT security
IoT Security Awareness Training : Tonex Training
IoT Security and Privacy Considerations
Iot Security, Internet of Things
Privacy and security in IoT
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies

What's hot (20)

PPTX
IoT Security Imperative: Stop your Fridge from Sending you Spam
PPTX
Automatski - The Internet of Things - Privacy in IoT
PPTX
IoT Security Training, IoT Security Awareness 2019
DOCX
Security and Privacy considerations in Internet of Things
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PPTX
Principals of IoT security
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PDF
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
PDF
Iot Security and Privacy at Scale
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
PPTX
security and privacy-Internet of things
PPTX
Internet of Things Security
PPTX
Security issues and solutions : IoT
PPTX
5 phases of IoT
PDF
IoT Security Elements
PPTX
Practical IoT Security in the Enterprise
PDF
Contextual Cyber Security for IoT
PPTX
A survey in privacy and security in Internet of Things IOT
PDF
IoT: Security & Privacy at IGNITE 2015
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
IoT Security Imperative: Stop your Fridge from Sending you Spam
Automatski - The Internet of Things - Privacy in IoT
IoT Security Training, IoT Security Awareness 2019
Security and Privacy considerations in Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Principals of IoT security
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Iot Security and Privacy at Scale
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
security and privacy-Internet of things
Internet of Things Security
Security issues and solutions : IoT
5 phases of IoT
IoT Security Elements
Practical IoT Security in the Enterprise
Contextual Cyber Security for IoT
A survey in privacy and security in Internet of Things IOT
IoT: Security & Privacy at IGNITE 2015
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Ad

Viewers also liked (20)

PPT
IoT security (Internet of Things)
PDF
The 5 elements of IoT security
PPTX
Are You Safe in IOT? - Know About Different Types of Threats
PDF
Internet of Things - Privacy and Security issues
PDF
Internet of Things Security Patterns
PPTX
Security in IoT
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
PDF
IoT Security: Problems, Challenges and Solutions
PDF
Overview of IoT and Security issues
PPTX
IoT Security Risks and Challenges
PPTX
YUPS IoT Product profile
PDF
Understanding and Mitigating IoT Security Hazards
PPT
Business Presentation(Thai)
PDF
MT82 IoT Security Starts at Edge
PPTX
Control Scheme for a Stand-Alone Wind Energy Conversion System
PDF
Data analytics for monitoring IoT infrastructures by G.Madhusudan, Orange Labs
PPTX
Control scheme for a stand alone wind energy convertion system
PDF
The Rise of Platforms in the IoT
PDF
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
PPTX
Successful Industrial IoT patterns
IoT security (Internet of Things)
The 5 elements of IoT security
Are You Safe in IOT? - Know About Different Types of Threats
Internet of Things - Privacy and Security issues
Internet of Things Security Patterns
Security in IoT
Track 5 session 1 - st dev con 2016 - need for security for iot
IoT Security: Problems, Challenges and Solutions
Overview of IoT and Security issues
IoT Security Risks and Challenges
YUPS IoT Product profile
Understanding and Mitigating IoT Security Hazards
Business Presentation(Thai)
MT82 IoT Security Starts at Edge
Control Scheme for a Stand-Alone Wind Energy Conversion System
Data analytics for monitoring IoT infrastructures by G.Madhusudan, Orange Labs
Control scheme for a stand alone wind energy convertion system
The Rise of Platforms in the IoT
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Successful Industrial IoT patterns
Ad

Similar to IoT security patterns (20)

DOCX
Can you please explain some of the Security Challenges for Internet of.docx
PDF
internet of thingsssssssssssssssssssssss
PDF
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
PDF
IoT – Breaking Bad
PDF
Safeguarding the Internet of Things
DOCX
Addressing security and privacy in io t ecosystem v0.4
PDF
Cybersecurity in the Age of IoT - Skillmine
PPTX
Top Security Solutions for Hyperconnectivity and IoT: A Comprehensive Guide
PPTX
A Wake-Up Call for IoT
PDF
Strengthening IoT Security Against Cyber Threats.pdf
PDF
Security and Privacy Big Challenges in Internet of things
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
Smau Milano 2015 - Stefano Zanero
PDF
Security in IoT
PDF
The Evolution of Cybersecurity in the Age of IoT.pdf
PPTX
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
PDF
Io t business-index-2020-securing-iot
PPTX
PDF
Security Challenges in IoT Software Development and Possible Solutions.pdf
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
Can you please explain some of the Security Challenges for Internet of.docx
internet of thingsssssssssssssssssssssss
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
IoT – Breaking Bad
Safeguarding the Internet of Things
Addressing security and privacy in io t ecosystem v0.4
Cybersecurity in the Age of IoT - Skillmine
Top Security Solutions for Hyperconnectivity and IoT: A Comprehensive Guide
A Wake-Up Call for IoT
Strengthening IoT Security Against Cyber Threats.pdf
Security and Privacy Big Challenges in Internet of things
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Smau Milano 2015 - Stefano Zanero
Security in IoT
The Evolution of Cybersecurity in the Age of IoT.pdf
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
Io t business-index-2020-securing-iot
Security Challenges in IoT Software Development and Possible Solutions.pdf
Final Research Project - Securing IoT Devices What are the Challe.docx

Recently uploaded (20)

PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
medical staffing services at VALiNTRY
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
Digital Strategies for Manufacturing Companies
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
ai tools demonstartion for schools and inter college
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Introduction to Artificial Intelligence
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
L1 - Introduction to python Backend.pptx
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Digital Systems & Binary Numbers (comprehensive )
How to Choose the Right IT Partner for Your Business in Malaysia
Understanding Forklifts - TECH EHS Solution
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PTS Company Brochure 2025 (1).pdf.......
medical staffing services at VALiNTRY
Designing Intelligence for the Shop Floor.pdf
Digital Strategies for Manufacturing Companies
VVF-Customer-Presentation2025-Ver1.9.pptx
ai tools demonstartion for schools and inter college
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Reimagine Home Health with the Power of Agentic AI​
How to Migrate SBCGlobal Email to Yahoo Easily
CHAPTER 2 - PM Management and IT Context
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Introduction to Artificial Intelligence
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
L1 - Introduction to python Backend.pptx

IoT security patterns

  • 1. IoT Security Patterns Mark Benson, CTO @markbenson
  • 2. The IoT opportunity Recent Economist survey: Expect their company to be using IoT within 3 years “IoT is our single biggest threat AND biggest opportunity over the next 10 years” – Brand-name fortune 500 board of directors *Source: ABI Research, Cisco, Craig Hallum Estimates 0 2 4 6 8 10 12 14 16 18 20 $0 $50 $100 $150 $200 $250 DevicesBillions MarketSizeBillions Big Data Analytics (53% CAGR) Connected Device Platforms (33% CAGR) Platforms (33% CAGR) Application Enablement Platforms (32% CAGR) Value Added Services (26% CAGR) System Integration Services (24% CAGR) Hardware (23% CAGR) Connectivity (12% CAGR) Internet-connected devices (Cisco Estimate) 95%
  • 3. The Internet of Things? More like the Internet of Attack Vectors • Attack surfaces are expanding rapidly • Physical access to systems is becoming easier • Consumer privacy concerns are rising • Consequences of a breach are becoming more severe (critical infrastructure, brand deterioration, data privacy issues, etc.) • Product companies are being forced outside of their comfort zones • Three dimensions that make IoT security challenging…
  • 6. 3. Usage modes Things to note about IoT usage modes that affect security: 1. Some modes are normal and standard solutions exist 2. Some modes are new and standards are still emerging 3. Some modes are becoming more vulnerable due to resource constraints
  • 7. The IoT security problem area A. High resource constraints B. Complex deployment topologies C. Novel usage modes Mo’ IoT, mo’ problems
  • 8. The 4th dimension: time Now we have a Tesseract The difficulty with IoT security is that the landscape is constantly changing, even after products are deployed Security should be designed for from the beginning and embraced as a journey throughout It starts with a process…
  • 9. The web you should be weaving Secure processes => secure products => secure brand integrity
  • 10. Conclusion Takeaways: 1. Security processes. Have a security architecture from the beginning and evolve throughout (layers, topologies, modes) 2. Technology selection. Start it from the beginning and evolve thoughout 3. Operations planning. How do you respond if/when a security incident occurs in the field. Use checklists – http://owasp.org/ – http://builditsecure.ly/ Embrace the journey