© 2015 InterWorks, Page 1
Caston Thomas
How to Adapt to the IoT
cthomas@iworkstech.com 586.530.4981
© 2015 InterWorks, Page 2
• IoT is NOT BYoD
Defining IoT/What is IoT?
© 2015 InterWorks, Page 3
How Did This Slide Get in Here?!?
© 2015 InterWorks, Page 4
Sentinel Events – Examples we’ve seen to date…
Night Dragon - 2011 Shamoon - 2012 Energetic Bear - 2012
Norwegian
Oil & Gas - 2014
German steel works - 2014 Car Washes - 2015
Insulin Pumps - 2013
© 2015 InterWorks, Page 6
How Things Will Change
© 2015 InterWorks, Page 7
Potential impact & exposures?
© 2015 InterWorks, Page 9
Creating a New Security Framework
© 2015 InterWorks, Page 10
Be as specific as
possible
Identify all components
Note business objectives
Create use cases for
each variant
The “devil will be in the
details”
Start with the worst thing
that can happen
Make sure you include all
relevant externalities
(e.g., consumers,
regulators, public
opinion)
Start with interfaces &
potential attack surfaces
including physical access
Stay just outside the
realm of what is
reasonably foreseeable
Pair the impacts with the
vulnerabilities
New threats will become
apparent
Potential threats may be
considered speculative
Use threats to help define
impacts & vulnerabilities
Threats will evolve as
incentives change
Threats will evolve as IoT
becomes more common
Build the Risk Model
Define Use
Cases
Identify
potential
impact
Define likely
vulnerabilities
Identify
evolving
threats
© 2015 InterWorks, Page 11
The Devices & Risks are Diverseso How Do We Secure Them?
© 2015 InterWorks, Page 12
Useful to Think in Terms of Overall Process
Courtesy: F5 Labs
© 2015 InterWorks, Page 13
NIST smart meter flow diagram (2014)
© 2015 InterWorks, Page 14
Look at the Threat & Pair with Appropriate Controls
Courtesy: ©2015 Leidos. Used with permission.
© 2015 InterWorks, Page 15
Campaign analysis is used to determine
the patterns & behaviors of attackers
Cyber Kill Chain®
Campaign “Heat Map”
Group intrusions together into “Campaigns”
Prioritize & measure against each Campaign
Understand the Threat Landscape
© 2015 InterWorks, Page 16
• Rethink Everything!!!
– Reduce the surface!!!
– Tech Selection – Based on Meta Trends!
• Know Your Line-Up!!!
– Your Users, Executives & Management – Learn & Teach
– Your Adversaries – Anticipate their Tactics, Techniques
& Procedures
– Your Network (IoP) – Take a Vendor to Lunch
• Use the Resources that Are on Your Side!!!
– Leverage Management’s Focus on Security
– Retool your Response Processes
– Measure & Adapt
Creating an IoT security strategy
© 2015 InterWorks, Page 17
Prevention is ideal, but detection is a must.
However, detection without correction has minimal value.
Automate the Response Based on Policies.
MOVE & DISABLERESTRICT ACCESSALERT & REMEDIATE
Deploy a Virtual Firewall around an infected
or non-compliant device
Reassign the device into a VLAN with
restricted access
Update access lists (ACLs) on switches,
firewalls & routers to restrict access
Automatically move device to a pre-
configured guest network
Open trouble ticket
Send email notification
SNMP Traps
Syslog
HTTP browser hijack
Auditable end-user acknowledgement
Self-remediation
Integrate with SMS, WSUS, SCCM,
Lumension, BigFix
Reassign device from production VLAN to
quarantine VLAN
Block access with 802.1X
Alter login credentials to block access
Block access with device authentication
Turn off switch port (802.1X or SNMP)
Terminate unauthorized applications
Disable peripheral device
Rethinking the Technology Components & Responses
© 2015 InterWorks, Page 20
• Next week you should:
– Begin identifying the IoT implementations that are in place, planned, or anticipated – not
just inside your organization, but also in possession of your key people & partners
– Identify security policies or procedures that may be impacted by IoT
• In the next 90 days:
– Begin applying the risk models & review results with management
– Identify mitigation steps & associated costs to achieve desired state
– Review insurance coverage & applicability
• In the next year:
– Implement ongoing security monitoring (real-time with automated response)
– Continue identifying the IoT risks that you don’t control that affect your organization
– Build your IoP to collaborate on your evolution into this new world we’re entering
– Revise risk management model & obtain necessary approvals after each change of
scope (and you better believe that scope will change frequently)
7 or 8 or 9 things we can do to prepare
© 2015 InterWorks, Page 23
Thank You!
And Now…
It’s YOUR Turn!

More Related Content

PDF
Outpost24 Webinar - Common wireless security threats and how to avoid them
PDF
Outpost24 webinar - A day in the life of an information security professional
PPTX
451 and Cylance - The Roadmap To Better Endpoint Security
PDF
Cylance Protect-Next-Generation Antivirus-Overview
PDF
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
PPTX
5 benefits of network monitoring
PDF
Container Security: What Enterprises Need to Know
PDF
Intel Security Endpoint Protection
Outpost24 Webinar - Common wireless security threats and how to avoid them
Outpost24 webinar - A day in the life of an information security professional
451 and Cylance - The Roadmap To Better Endpoint Security
Cylance Protect-Next-Generation Antivirus-Overview
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
5 benefits of network monitoring
Container Security: What Enterprises Need to Know
Intel Security Endpoint Protection

What's hot (19)

PDF
The New Normal: Managing the constant stream of new vulnerabilities
PPTX
Outpost24 webinar: Risk-based approach to security assessments
PDF
Outpost24 webinar - Implications when migrating to a Zero Trust model
PDF
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
PPTX
If We Only Had the Time: How Security Teams Can Focus On What’s Important
PPTX
What to do when get hacked or suffer a cyber breach
PDF
The view of auditor on cybercrime
PPTX
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
PDF
ImageQuest_Cybersecurity_OnePage
PDF
Outpost24 webinar - Mastering the art of multicloud security
PDF
Outpost24 Webinar - Creating a sustainable application security program to dr...
PDF
Outpost24 webinar - Busting the myths of cloud security
PDF
Infographic: 5 Tips for Approaching Customers About Cloud Security
PDF
10 KEYS TO EFFECTIVE NETWORK SECURITY
PDF
Revitalizing Product Securtiy at Zephyr Health
PPTX
You can't teach an old dog new tricks
PDF
Outpost24 webinar: Security Analytics: what's in a risk score
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PPTX
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
The New Normal: Managing the constant stream of new vulnerabilities
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar - Implications when migrating to a Zero Trust model
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
If We Only Had the Time: How Security Teams Can Focus On What’s Important
What to do when get hacked or suffer a cyber breach
The view of auditor on cybercrime
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
ImageQuest_Cybersecurity_OnePage
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 Webinar - Creating a sustainable application security program to dr...
Outpost24 webinar - Busting the myths of cloud security
Infographic: 5 Tips for Approaching Customers About Cloud Security
10 KEYS TO EFFECTIVE NETWORK SECURITY
Revitalizing Product Securtiy at Zephyr Health
You can't teach an old dog new tricks
Outpost24 webinar: Security Analytics: what's in a risk score
Application Hackers Have A Handbook. Why Shouldn't You?
SOMETHING INTANGIBLE, BUT REAL ABOUT CYBERSECURITY
Ad

Similar to How to adapt to the IoT (20)

PDF
Cyber Security in Manufacturing
PDF
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
PDF
IoT Security Challenges and Solutions
PDF
Cybersecurity in the Age of IoT - Skillmine
PDF
IoT security Q3 2020 overview
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
PDF
Embracing iot in the enterprise
PPTX
Cybersecurity in the Era of IoT
PDF
New challenges to secure the IoT (with notes)
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PDF
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
PDF
Security for the IoT - Report Summary
PDF
Conférence ENGIE ACSS 2018
PDF
Simon Harrison RWE - Chain of Things 010616 final
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
From Identity to Ownership Theft
PDF
From IT to IoT: Bridging the Growing Cybersecurity Divide
PDF
Privacy & Security for the Internet of Things
PPTX
Security Testing for IoT Systems
PDF
The Internet of Things – Good, Bad or Just Plain Ugly?
Cyber Security in Manufacturing
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
IoT Security Challenges and Solutions
Cybersecurity in the Age of IoT - Skillmine
IoT security Q3 2020 overview
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
Embracing iot in the enterprise
Cybersecurity in the Era of IoT
New challenges to secure the IoT (with notes)
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects
Security for the IoT - Report Summary
Conférence ENGIE ACSS 2018
Simon Harrison RWE - Chain of Things 010616 final
IoT Security: Debunking the "We Aren't THAT Connected" Myth
From Identity to Ownership Theft
From IT to IoT: Bridging the Growing Cybersecurity Divide
Privacy & Security for the Internet of Things
Security Testing for IoT Systems
The Internet of Things – Good, Bad or Just Plain Ugly?
Ad

More from Caston Thomas (8)

PDF
Master gardeners... meet... "High Yech"
PDF
Cybersecurity for CRM v0219-3
PDF
7.5 steps to overlaying byod & iot
PDF
How to adapt to the IOT
PPTX
The internet of things (io t) for issa v1.3
PDF
Inter works golden circles for healthcare it
PDF
7.5 steps to overlaying BYoD & IoT on Existing Investments
PDF
How I learned to stop worrying & love the BYOD
Master gardeners... meet... "High Yech"
Cybersecurity for CRM v0219-3
7.5 steps to overlaying byod & iot
How to adapt to the IOT
The internet of things (io t) for issa v1.3
Inter works golden circles for healthcare it
7.5 steps to overlaying BYoD & IoT on Existing Investments
How I learned to stop worrying & love the BYOD

Recently uploaded (9)

DOC
EIU毕业证学历认证,贝尔维尤学院毕业证国外毕业证
PPTX
Social Media People PowerPoint Templates.pptx
PDF
2025 Guide to Buy Verified Cash App Accounts You Can Trust.pdf
PDF
Kids, Screens & Emotional Development by Meenakshi Khakat
DOC
SIUE毕业证学历认证,阿祖萨太平洋大学毕业证学位证书复制
PDF
Best 4 Sites for Buy Verified Cash App Accounts – BTC Only.pdf
DOC
NIU毕业证学历认证,阿比林基督大学毕业证留学生学历
PDF
Date Right Stuff - Invite only, conservative dating app
PPTX
Introduction to Packet Tracer Course Overview - Aug 21 (1).pptx
EIU毕业证学历认证,贝尔维尤学院毕业证国外毕业证
Social Media People PowerPoint Templates.pptx
2025 Guide to Buy Verified Cash App Accounts You Can Trust.pdf
Kids, Screens & Emotional Development by Meenakshi Khakat
SIUE毕业证学历认证,阿祖萨太平洋大学毕业证学位证书复制
Best 4 Sites for Buy Verified Cash App Accounts – BTC Only.pdf
NIU毕业证学历认证,阿比林基督大学毕业证留学生学历
Date Right Stuff - Invite only, conservative dating app
Introduction to Packet Tracer Course Overview - Aug 21 (1).pptx

How to adapt to the IoT

  • 1. © 2015 InterWorks, Page 1 Caston Thomas How to Adapt to the IoT cthomas@iworkstech.com 586.530.4981
  • 2. © 2015 InterWorks, Page 2 • IoT is NOT BYoD Defining IoT/What is IoT?
  • 3. © 2015 InterWorks, Page 3 How Did This Slide Get in Here?!?
  • 4. © 2015 InterWorks, Page 4 Sentinel Events – Examples we’ve seen to date… Night Dragon - 2011 Shamoon - 2012 Energetic Bear - 2012 Norwegian Oil & Gas - 2014 German steel works - 2014 Car Washes - 2015 Insulin Pumps - 2013
  • 5. © 2015 InterWorks, Page 6 How Things Will Change
  • 6. © 2015 InterWorks, Page 7 Potential impact & exposures?
  • 7. © 2015 InterWorks, Page 9 Creating a New Security Framework
  • 8. © 2015 InterWorks, Page 10 Be as specific as possible Identify all components Note business objectives Create use cases for each variant The “devil will be in the details” Start with the worst thing that can happen Make sure you include all relevant externalities (e.g., consumers, regulators, public opinion) Start with interfaces & potential attack surfaces including physical access Stay just outside the realm of what is reasonably foreseeable Pair the impacts with the vulnerabilities New threats will become apparent Potential threats may be considered speculative Use threats to help define impacts & vulnerabilities Threats will evolve as incentives change Threats will evolve as IoT becomes more common Build the Risk Model Define Use Cases Identify potential impact Define likely vulnerabilities Identify evolving threats
  • 9. © 2015 InterWorks, Page 11 The Devices & Risks are Diverseso How Do We Secure Them?
  • 10. © 2015 InterWorks, Page 12 Useful to Think in Terms of Overall Process Courtesy: F5 Labs
  • 11. © 2015 InterWorks, Page 13 NIST smart meter flow diagram (2014)
  • 12. © 2015 InterWorks, Page 14 Look at the Threat & Pair with Appropriate Controls Courtesy: ©2015 Leidos. Used with permission.
  • 13. © 2015 InterWorks, Page 15 Campaign analysis is used to determine the patterns & behaviors of attackers Cyber Kill Chain® Campaign “Heat Map” Group intrusions together into “Campaigns” Prioritize & measure against each Campaign Understand the Threat Landscape
  • 14. © 2015 InterWorks, Page 16 • Rethink Everything!!! – Reduce the surface!!! – Tech Selection – Based on Meta Trends! • Know Your Line-Up!!! – Your Users, Executives & Management – Learn & Teach – Your Adversaries – Anticipate their Tactics, Techniques & Procedures – Your Network (IoP) – Take a Vendor to Lunch • Use the Resources that Are on Your Side!!! – Leverage Management’s Focus on Security – Retool your Response Processes – Measure & Adapt Creating an IoT security strategy
  • 15. © 2015 InterWorks, Page 17 Prevention is ideal, but detection is a must. However, detection without correction has minimal value. Automate the Response Based on Policies. MOVE & DISABLERESTRICT ACCESSALERT & REMEDIATE Deploy a Virtual Firewall around an infected or non-compliant device Reassign the device into a VLAN with restricted access Update access lists (ACLs) on switches, firewalls & routers to restrict access Automatically move device to a pre- configured guest network Open trouble ticket Send email notification SNMP Traps Syslog HTTP browser hijack Auditable end-user acknowledgement Self-remediation Integrate with SMS, WSUS, SCCM, Lumension, BigFix Reassign device from production VLAN to quarantine VLAN Block access with 802.1X Alter login credentials to block access Block access with device authentication Turn off switch port (802.1X or SNMP) Terminate unauthorized applications Disable peripheral device Rethinking the Technology Components & Responses
  • 16. © 2015 InterWorks, Page 20 • Next week you should: – Begin identifying the IoT implementations that are in place, planned, or anticipated – not just inside your organization, but also in possession of your key people & partners – Identify security policies or procedures that may be impacted by IoT • In the next 90 days: – Begin applying the risk models & review results with management – Identify mitigation steps & associated costs to achieve desired state – Review insurance coverage & applicability • In the next year: – Implement ongoing security monitoring (real-time with automated response) – Continue identifying the IoT risks that you don’t control that affect your organization – Build your IoP to collaborate on your evolution into this new world we’re entering – Revise risk management model & obtain necessary approvals after each change of scope (and you better believe that scope will change frequently) 7 or 8 or 9 things we can do to prepare
  • 17. © 2015 InterWorks, Page 23 Thank You! And Now… It’s YOUR Turn!