SlideShare a Scribd company logo
The “Enterprise Network of Things” 
Piers Wilson 
Head of Product Management
What is the “Internet of Things” 
What are the security issues 
How can we solve (or avoid) these 
Agenda 
September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 2
Background – what is the “Internet of Things” 
The "Internet of Things” is the network 
of physical objects that contains 
embedded technology to 
communicate and sense or interact 
with the objects' internal state or the 
external environment 
Gartner 
• Common characteristics 
– Embedded/bespoke technologies 
– Network connected (Intra & Internet) 
– Cloud back-end for applications, web 
control, data tracking 
– Mobile/App/Web control interfaces 
September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 3 
Image source: Gartner, 2014
Security issues will arise, and already are... 
• Overall track record on security is not good 
– Workstations, web applications, enterprise networks, open 
source code, centrifuges, operating systems, malware, mobile 
devices... 
• Device manufacturers are even less experienced at 
defending systems 
– Fridges, light bulbs, cars, HVAC systems, healthcare devices 
• Users generally don’t tend to enable security, or really 
care about it 
– Especially at work 
September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 4
Hypotheses 
IoT technologies 
(domestic or 
enterprise) will be 
connected to 
enterprise 
networks 
September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 5 
IoT technology 
failure implications 
will be “real” and 
potentially 
serious/damaging/ 
life affecting 
IoT use will 
originate from the 
business or user 
communities - not 
from IT function 
IoT will involve 
mobile and cloud 
for access, control 
and storage – so 
these will be 
factors 
IoT devices will have 
vulnerabilities 
Hoping for “Secure” 
IoT devices that 
comply with 
standards is probably 
unrealistic 
IoT vulnerabilities 
will have knock-on 
effects and 
exposure other 
data, systems, 
networks, users 
Number/diversity 
will be greater than 
traditional 
technologies = 
more traffic
1) Plan an IOT-aware enterprise network 
• The proliferation of connected IoT devices is expected to increase 
• IoT also means, consciously or not, embracing cloud access for users and the 
business as well as the adoption of mobile and wireless technologies 
• IoT, cloud and mobile connectivity will become normal and traditional security 
approaches will become less effective 
September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 6
2) Drive business engagement in IoT 
• Develop security use cases for the business user communities in conjunction 
with user communities and security teams 
– Momentum as businesses seek to meet user, consumer, operational demands 
– Build security and risk reduction into interaction with the IoT world 
– Inaction or poor planning risks IT security becoming an impediment to future 
business activities 
• If connected devices / control systems are likely to be core to your business, 
then integrate specific security safeguards now, rather than trying to retrofit 
them later 
September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 7
3) Strive for IoT visibility 
• IoT evolution is already well underway – with a growing range of security risks 
• Don’t expect to be able to define policies or sets of patterns or rules for “IoT Access 
Lists” or “Device Vulnerability Signatures” 
• Ensure appropriate visibility of technology environment and streamline reporting and 
compliance processes 
– Optimise and automate security processes 
• Have adequate systems and processes to be able to detect: 
– Connections and activity 
– Failures and compromises 
– Impacts on the operation of the IT environment and the business 
September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 8
Summary – 3 Goals 
1. Have a network and system monitoring capability that is able to detect IoT 
technologies when they are connected and operating (and failing) 
2. Ensure that if (when) IoT technologies are attacked or malfunction you can 
detect it quickly, investigate and respond in a timely manner 
3. Automate responses and network security controls, predefine scripts and 
build timely fail-safe responses to foreseeable threats 
September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 9
Questions 
piers.wilson@tier-3.com 
+44 (0) 7800 508517 
www.tier-3.com @tier3huntsman
About Tier-3 Huntsman® - and where to hear more ... 
• Tier-3 Huntsman® is a defence-grade intelligent threat detecetion 
and incident management solution 
• Real-time alerting, compliance monitoring & reporting for major 
security standards (PCI-DSS, ISO27001, GPG13 ...) 
- Speeding up the detection and response process 
- True Behavioural Anomaly Detection 
• Log, network, transaction and event data collection 
- Fully centralised / accessible through a single, unified interface 
• Ad hoc & scheduled compliance reporting 
• Advanced automation for information gathering and response 
• Comprehensive investigation / workflow capabilities 
Huntsman® enables organisations to satisfy monitoring 
and compliance requirements with minimum effort, 
maximum automation and low overhead

More Related Content

PDF
2021 English Part One Anti-phishing Webinar Presentation Slides
PDF
IoT: Security & Privacy at IGNITE 2015
PDF
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
PPTX
Webinar Ivanti Neurons For Patch Intelligence
PPTX
Cybersecurity in the Era of IoT
PPTX
Information Security : Is it an Art or a Science
PDF
Security Awareness
PPSX
The Ultimate Guide To Cyber Security Certifications
2021 English Part One Anti-phishing Webinar Presentation Slides
IoT: Security & Privacy at IGNITE 2015
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Webinar Ivanti Neurons For Patch Intelligence
Cybersecurity in the Era of IoT
Information Security : Is it an Art or a Science
Security Awareness
The Ultimate Guide To Cyber Security Certifications

What's hot (18)

PDF
The importance of information security
PPTX
Information security
PPTX
Ravi i ot-security
PDF
The Future of Cyber Security - Matthew Rosenquist
PPT
Information security.pptx
PPTX
Monitoring security in the externalised organisation (Auscert 2013)
PDF
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
PDF
Security and Privacy Big Challenges in Internet of things
PDF
Cyber Security_Presentation_KTH
PPTX
Security Testing for IoT Systems
PPTX
Security and Wearables: Success starts with security
PPTX
Securing the Digital Economy: Reinventing the Internet
PDF
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
PPTX
Iot cyber security
PDF
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
PDF
Cybersecurity Skills in Industry 4.0
PPT
Challenges in implementating cyber security
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
The importance of information security
Information security
Ravi i ot-security
The Future of Cyber Security - Matthew Rosenquist
Information security.pptx
Monitoring security in the externalised organisation (Auscert 2013)
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
Security and Privacy Big Challenges in Internet of things
Cyber Security_Presentation_KTH
Security Testing for IoT Systems
Security and Wearables: Success starts with security
Securing the Digital Economy: Reinventing the Internet
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
Iot cyber security
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Cybersecurity Skills in Industry 4.0
Challenges in implementating cyber security
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ad

Viewers also liked (6)

PDF
Huntsman - Internet of things (for IAP2015)
PDF
Will Internet of Things (IoT) be secure enough?
PDF
The Internet of Things: Privacy and Security Issues
PDF
Security in the Internet of Things
PPT
IoT security (Internet of Things)
PDF
Internet of Things - Privacy and Security issues
Huntsman - Internet of things (for IAP2015)
Will Internet of Things (IoT) be secure enough?
The Internet of Things: Privacy and Security Issues
Security in the Internet of Things
IoT security (Internet of Things)
Internet of Things - Privacy and Security issues
Ad

Similar to Internet of Things: Dealing with the enterprise network of things (20)

PDF
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
PDF
White Paper: IoT Security – Protecting the Networked Society
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPTX
Future of Internet.pptx
PDF
Security in IoT
PPTX
A Wake-Up Call for IoT
DOCX
IoT - RTD WHITE PAPER SquaredOnline
DOCX
Can you please explain some of the Security Challenges for Internet of.docx
PPTX
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
PDF
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
Cybersecurity in the Age of IoT - Skillmine
DOCX
Security and Privacy considerations in Internet of Things
PDF
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
DOCX
Addressing security and privacy in io t ecosystem v0.4
PDF
How Secure are you Around “IoT”_.pdf
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PDF
Simon Harrison RWE - Chain of Things 010616 final
PPTX
IoT security
Is IoT Security A Challenge? Surefire Target Plan Explained | USCSI®
White Paper: IoT Security – Protecting the Networked Society
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Future of Internet.pptx
Security in IoT
A Wake-Up Call for IoT
IoT - RTD WHITE PAPER SquaredOnline
Can you please explain some of the Security Challenges for Internet of.docx
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Cybersecurity in the Age of IoT - Skillmine
Security and Privacy considerations in Internet of Things
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
Addressing security and privacy in io t ecosystem v0.4
How Secure are you Around “IoT”_.pdf
IoT Security, Threats and Challenges By V.P.Prabhakaran
Simon Harrison RWE - Chain of Things 010616 final
IoT security

More from Huntsman Security (8)

PPTX
Infosecurity Europe 2016 - Low-friction Security
PPTX
Infosec 2015 - Using threat intelligence to improve security response
PDF
Huntsman - Threat intelligence (for IAP2015)
PPTX
Intelligence-based computer network defence: Understanding the cyber kill cha...
PDF
Infosec 2014 - Considerations when choosing an MSSP
PDF
Using automation to improve the effectiveness of security operations
PPTX
Insider threats - Lessons from Snowden (ISF UK Chapter)
PDF
Hidden security and privacy consequences around mobility (Infosec 2013)
Infosecurity Europe 2016 - Low-friction Security
Infosec 2015 - Using threat intelligence to improve security response
Huntsman - Threat intelligence (for IAP2015)
Intelligence-based computer network defence: Understanding the cyber kill cha...
Infosec 2014 - Considerations when choosing an MSSP
Using automation to improve the effectiveness of security operations
Insider threats - Lessons from Snowden (ISF UK Chapter)
Hidden security and privacy consequences around mobility (Infosec 2013)

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Machine Learning_overview_presentation.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx
Machine Learning_overview_presentation.pptx
Assigned Numbers - 2025 - Bluetooth® Document
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
A comparative analysis of optical character recognition models for extracting...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Internet of Things: Dealing with the enterprise network of things

  • 1. The “Enterprise Network of Things” Piers Wilson Head of Product Management
  • 2. What is the “Internet of Things” What are the security issues How can we solve (or avoid) these Agenda September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 2
  • 3. Background – what is the “Internet of Things” The "Internet of Things” is the network of physical objects that contains embedded technology to communicate and sense or interact with the objects' internal state or the external environment Gartner • Common characteristics – Embedded/bespoke technologies – Network connected (Intra & Internet) – Cloud back-end for applications, web control, data tracking – Mobile/App/Web control interfaces September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 3 Image source: Gartner, 2014
  • 4. Security issues will arise, and already are... • Overall track record on security is not good – Workstations, web applications, enterprise networks, open source code, centrifuges, operating systems, malware, mobile devices... • Device manufacturers are even less experienced at defending systems – Fridges, light bulbs, cars, HVAC systems, healthcare devices • Users generally don’t tend to enable security, or really care about it – Especially at work September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 4
  • 5. Hypotheses IoT technologies (domestic or enterprise) will be connected to enterprise networks September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 5 IoT technology failure implications will be “real” and potentially serious/damaging/ life affecting IoT use will originate from the business or user communities - not from IT function IoT will involve mobile and cloud for access, control and storage – so these will be factors IoT devices will have vulnerabilities Hoping for “Secure” IoT devices that comply with standards is probably unrealistic IoT vulnerabilities will have knock-on effects and exposure other data, systems, networks, users Number/diversity will be greater than traditional technologies = more traffic
  • 6. 1) Plan an IOT-aware enterprise network • The proliferation of connected IoT devices is expected to increase • IoT also means, consciously or not, embracing cloud access for users and the business as well as the adoption of mobile and wireless technologies • IoT, cloud and mobile connectivity will become normal and traditional security approaches will become less effective September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 6
  • 7. 2) Drive business engagement in IoT • Develop security use cases for the business user communities in conjunction with user communities and security teams – Momentum as businesses seek to meet user, consumer, operational demands – Build security and risk reduction into interaction with the IoT world – Inaction or poor planning risks IT security becoming an impediment to future business activities • If connected devices / control systems are likely to be core to your business, then integrate specific security safeguards now, rather than trying to retrofit them later September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 7
  • 8. 3) Strive for IoT visibility • IoT evolution is already well underway – with a growing range of security risks • Don’t expect to be able to define policies or sets of patterns or rules for “IoT Access Lists” or “Device Vulnerability Signatures” • Ensure appropriate visibility of technology environment and streamline reporting and compliance processes – Optimise and automate security processes • Have adequate systems and processes to be able to detect: – Connections and activity – Failures and compromises – Impacts on the operation of the IT environment and the business September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 8
  • 9. Summary – 3 Goals 1. Have a network and system monitoring capability that is able to detect IoT technologies when they are connected and operating (and failing) 2. Ensure that if (when) IoT technologies are attacked or malfunction you can detect it quickly, investigate and respond in a timely manner 3. Automate responses and network security controls, predefine scripts and build timely fail-safe responses to foreseeable threats September 2014 © 2014 Tier-3 Pty Limited. All rights reserved. 9
  • 10. Questions piers.wilson@tier-3.com +44 (0) 7800 508517 www.tier-3.com @tier3huntsman
  • 11. About Tier-3 Huntsman® - and where to hear more ... • Tier-3 Huntsman® is a defence-grade intelligent threat detecetion and incident management solution • Real-time alerting, compliance monitoring & reporting for major security standards (PCI-DSS, ISO27001, GPG13 ...) - Speeding up the detection and response process - True Behavioural Anomaly Detection • Log, network, transaction and event data collection - Fully centralised / accessible through a single, unified interface • Ad hoc & scheduled compliance reporting • Advanced automation for information gathering and response • Comprehensive investigation / workflow capabilities Huntsman® enables organisations to satisfy monitoring and compliance requirements with minimum effort, maximum automation and low overhead