SlideShare a Scribd company logo
IoT Security
Make vs Buy?
Feb 2016
They Tell Us IoT Will be BIG!
Copyright © 2016 Verimatrix, Inc.2
Opportunity vs Threat
Technical exposure
Business risk
Customer confidence
Regulatory compliance
Copyright © 2016 Verimatrix, Inc.3
More Connectivity >>> More Threat Surfaces
Device control
Reprogramming
Man in middle
• Intercepting communication
• Alter communication
• Pretend to be a different player
Jamming / Blocking
Replay
Cloning
Monitoring
Data theft
Copyright © 2016 Verimatrix, Inc.4
Attacker Incentive
Research
Hacktivist
Economic – Exploits or Crime
Terrorism
Cyber warfare
Copyright © 2016 Verimatrix, Inc.5
Attacks: SOHO examples
Copyright © 2016 Verimatrix, Inc.
FAIL: Management backdoors
FAIL: Password vulnerabilities
FAIL: Update verification
https://www.sohopelesslybroken.com/news.html
6
Attacks: Samsung Fridge
Copyright © 2016 Verimatrix, Inc.
FAIL: test validity of SSL certificate
Threat: Neighbor stealing gmail credentials
http://www.theregister.co.uk/2015/08/24/smart_fridge_security_fubar/
7
Attacks: Vizio TV
Copyright © 2016 Verimatrix, Inc.
FAIL: test validity of SSL certificate
Threat: Impact on privacy
Awareness: 6th link
http://arstechnica.com/security/2015/11/man-in-the-middle-attack-on-vizio-tvs-coughs-up-owners-viewing-habits/
8
Attacks: Baby Monitor
Copyright © 2016 Verimatrix, Inc.
Baby monitor weaknesses overview:
http://fusion.net/story/192189/internet-connected-baby-monitors-trivial-to-hack/
Threat:
someone close
by
listening to you
baby.
9
Attacks: Hue Light Bulb
Copyright © 2016 Verimatrix, Inc.
Fail: Securing Token
Threat Control light – remotely
http://www.dhanjani.com/blog/2013/08/hacking-lightbulbs.html
10
Attacks: Smart Meter
Copyright © 2016 Verimatrix, Inc.
Open protocol / credentials
Threat:
Smart meter data
provides info on
• Appliance: HDR TV
• Occupancy and schedule
From:
Smart Meter Data: Privacy and Cybersecurity Congressional Research Service R42338
11
Attacks: Jeep
Copyright © 2016 Verimatrix, Inc.
FAIL: No segmentation
FAIL: No OTA update
http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Threat:
Loosing control in a driving car
12
Copyright © 2016 Verimatrix, Inc.
Attacks: Cloud
13
…and many others
such as Sony
IoT Security Snapshot
Copyright © 2016 Verimatrix, Inc.14
Device Hardware
Security
Secure Device
Update
Secure IP
Communications
Data Management
and Integrity
Threat monitoring
& response
TPM (Trusted Platform Module) and
SE (Secure Element)Used to
harden software based security
solutions in a layered security
approach
secure storage
secure boot Leverages security credentials and
signature process to enable a trusted
services for full or modular software update
Leverages security credentials to provide
authenticated client comms end point and
connection oriented or connectionless
secure communications framework
Activity tracking, Signature analysis,
flagging threats and orchestrating
response
Data aggregation, access control and
auditing
Policy compliance, regulatory compliance
IoT Vertical Markets – Generic Challenges
Copyright © 2016 Verimatrix, Inc.
Cloud data integrity
and compliance
Threat monitoring
And response
Secure device
communications
Secure device
update
Device integrity
Credential mgmnt
Smart Home Automotive mHealth Smart Cities Industrial
15
Copyright © 2016 Verimatrix, Inc.
Who Would You Trust?
Not just for Christmas - typical lifetime tasks
• Device credential management
• Secure software update
• Trusted secure IP communications – TCP, UDP, unicast, multicast
• Device threat monitoring
• Threat reporting/aggregation/alerting
• Data curation - secure repository with regulatory and policy compliance
Few in the industry with a broad, long term track record
16
Copyright © 2016 Verimatrix, Inc.
Summary
17
Threat surface of connected systems is extensive
The security challenge exists over the lifetime of the
application
How do you combine innovation and system integrity
Discussion
info@verimatrix.com
Copyright © 2016 Verimatrix, Inc.

More Related Content

PPTX
Towards Secure Multi-network Video Services - Cable Congress 2015
PPTX
"Towards Secure Multi-network Video Services" - NexTV Summit-Mumbai 2015
PDF
Making Hybrid Networks Smarter with Subscriber Analytics
PPTX
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
PDF
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
PPT
ArabianITS Corporate Presentation 220309
PDF
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
PPTX
Benefits of SIP Trunking
Towards Secure Multi-network Video Services - Cable Congress 2015
"Towards Secure Multi-network Video Services" - NexTV Summit-Mumbai 2015
Making Hybrid Networks Smarter with Subscriber Analytics
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
ArabianITS Corporate Presentation 220309
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Benefits of SIP Trunking

What's hot (20)

PDF
Rivetz - A blockchain smartphone's secret sauce
PPT
Kealy Kevin
PPTX
Who are Maintel?
PPT
Dmg tem2011-0718-05 madina--cto ns mobility pp
PPT
PPSX
Intelligence Driven Security
PDF
Solutions Overview for Banking
PDF
TADSummit, The MONEH Innovation Showcase chaired by James Body, Telet Research
PDF
Amdocs_Layer 123_ vCDN Business Case_Final
PDF
Virtualized policy control - fine-tuning data plans for enterprise customers
PPTX
CipherCloud for Salesforce - Solution Overview
PDF
John harrobin verizon adds parental controls, guest wi fi capabilities to fi ...
PPTX
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
PDF
Wholesale WI-Fi Monetization Models
PPTX
Introduction to Blockchain in Retail
PPT
Clearwire Company And Technology Overview
PDF
RunSafe Vehicle Guardian
PDF
Visionist - PSN Gateway for UK Public Sector
PDF
Our Company Presentation
Rivetz - A blockchain smartphone's secret sauce
Kealy Kevin
Who are Maintel?
Dmg tem2011-0718-05 madina--cto ns mobility pp
Intelligence Driven Security
Solutions Overview for Banking
TADSummit, The MONEH Innovation Showcase chaired by James Body, Telet Research
Amdocs_Layer 123_ vCDN Business Case_Final
Virtualized policy control - fine-tuning data plans for enterprise customers
CipherCloud for Salesforce - Solution Overview
John harrobin verizon adds parental controls, guest wi fi capabilities to fi ...
Deliver The Latest Wave 2 Wi-Fi as a Service | The Future of Sophisticated Wi...
Wholesale WI-Fi Monetization Models
Introduction to Blockchain in Retail
Clearwire Company And Technology Overview
RunSafe Vehicle Guardian
Visionist - PSN Gateway for UK Public Sector
Our Company Presentation
Ad

Viewers also liked (15)

PPTX
Verimatrix - Multi-network Solutions in the Real World - NexTV Latam 2012
PDF
Smartroom_by_Hibox
PDF
Hibox Aura
PDF
TVIP company
PDF
Iptv vs ott fontaine-idate
PPTX
Rise and Growth of OTT Video Market in Asia
PPTX
High Definition Iptv Set Top Box
PPTX
Proxima.TV OTT IPTV
PDF
Icareus Solutions OTT
PDF
Proxima.TV OTT Solution for Broadcaster and Content Publishers
PDF
Icareus Solutions Addressable TV Short Introduction
PDF
Home Brew IPTV head-end
PDF
Icareus Ltd company presentation 20170301
PPTX
Мультискрин-сервисы и гибридная ТВ-платформа Huawei
PDF
IPTV, Internet Video and Adaptive Streaming Technologies
Verimatrix - Multi-network Solutions in the Real World - NexTV Latam 2012
Smartroom_by_Hibox
Hibox Aura
TVIP company
Iptv vs ott fontaine-idate
Rise and Growth of OTT Video Market in Asia
High Definition Iptv Set Top Box
Proxima.TV OTT IPTV
Icareus Solutions OTT
Proxima.TV OTT Solution for Broadcaster and Content Publishers
Icareus Solutions Addressable TV Short Introduction
Home Brew IPTV head-end
Icareus Ltd company presentation 20170301
Мультискрин-сервисы и гибридная ТВ-платформа Huawei
IPTV, Internet Video and Adaptive Streaming Technologies
Ad

Similar to "IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016 (20)

PDF
Watch guard solution
PPTX
Sophos
PDF
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
PDF
Cyber security notes or Mca/bca about security
PPT
Information Security
PDF
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
PDF
Secure enterprise mobility
PPTX
Cyren cybersecurity of things
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PDF
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
PDF
Integrated Secure Networking - Fortinet
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PDF
HackMiami_2017_Chemerkin_Yury_for_website.pdf
PPTX
2017 Predictions: Identity and Security
PPTX
Three Secrets to Becoming a Mobile Security Superhero
PPTX
A CISO's Guide to Cyber Liability Insurance
PDF
Module 6.Security in Evolving Technology
PPTX
Slideshare fintech-may26th-def
PPTX
SAM05_Barber PW (7-9-15)
Watch guard solution
Sophos
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Cyber security notes or Mca/bca about security
Information Security
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
Secure enterprise mobility
Cyren cybersecurity of things
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Integrated Secure Networking - Fortinet
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
HackMiami_2017_Chemerkin_Yury_for_website.pdf
2017 Predictions: Identity and Security
Three Secrets to Becoming a Mobile Security Superhero
A CISO's Guide to Cyber Liability Insurance
Module 6.Security in Evolving Technology
Slideshare fintech-may26th-def
SAM05_Barber PW (7-9-15)

More from Verimatrix (20)

PPTX
Multi-network Forum at NAB 2015
PDF
TV in 2020 - Multi-network Solutions Breakfast Briefing at Connected TV Summi...
PDF
2020 (Telly) Vision - Multi-network Solutions Breakfast Briefing at Connected...
PPTX
Creando el Servicio de TV más Avanzado de Latinoamérica
PPTX
Multi-network Solutions in the Real World Forum at Convergence India
PPTX
Multi-network Solutions in the Real World at AfricaCast 2013
PPTX
Multi-network Solutions in the Real World Forum at IBC 2013
PPTX
IBC 2013 Multi-network Forum - Akamai
PPTX
IBC 2013 Multi-network Forum - Verimatrix
PPTX
IBC 2013 Multi-network Forum - Sony Pictures Entertainment
PPTX
IBC Multi-network Forum - Elemental Technologies
PDF
"Monetizando contenidos y aumentando ingresos" (Protecting revenue in all scr...
PPTX
"Operator as an App" - The Smart Pay-TV Future in Russia/CIS
PPTX
"Operator as an App" - The Smart Pay-TV Future in Russia/CIS (in Russian)
PPTX
Convergence India 2013 Multi-network Forum - Verimatrix
PPTX
Harmonized Security for Multi-network Video Services
PPTX
Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012
PPTX
Ibc forum 2012-divitel
PPTX
Ibc forum 2012-verimatrix
PPTX
Verimatrix - DECE-Ultraviolet at CommNexus April 2012
Multi-network Forum at NAB 2015
TV in 2020 - Multi-network Solutions Breakfast Briefing at Connected TV Summi...
2020 (Telly) Vision - Multi-network Solutions Breakfast Briefing at Connected...
Creando el Servicio de TV más Avanzado de Latinoamérica
Multi-network Solutions in the Real World Forum at Convergence India
Multi-network Solutions in the Real World at AfricaCast 2013
Multi-network Solutions in the Real World Forum at IBC 2013
IBC 2013 Multi-network Forum - Akamai
IBC 2013 Multi-network Forum - Verimatrix
IBC 2013 Multi-network Forum - Sony Pictures Entertainment
IBC Multi-network Forum - Elemental Technologies
"Monetizando contenidos y aumentando ingresos" (Protecting revenue in all scr...
"Operator as an App" - The Smart Pay-TV Future in Russia/CIS
"Operator as an App" - The Smart Pay-TV Future in Russia/CIS (in Russian)
Convergence India 2013 Multi-network Forum - Verimatrix
Harmonized Security for Multi-network Video Services
Verimatrix-Multi-network Solutions in the Real World - NexTV Mexico 2012
Ibc forum 2012-divitel
Ibc forum 2012-verimatrix
Verimatrix - DECE-Ultraviolet at CommNexus April 2012

Recently uploaded (20)

PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPT
ISS -ESG Data flows What is ESG and HowHow
PDF
Foundation of Data Science unit number two notes
PPTX
Introduction to Knowledge Engineering Part 1
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPT
Quality review (1)_presentation of this 21
PDF
Business Analytics and business intelligence.pdf
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
ISS -ESG Data flows What is ESG and HowHow
Foundation of Data Science unit number two notes
Introduction to Knowledge Engineering Part 1
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
oil_refinery_comprehensive_20250804084928 (1).pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
.pdf is not working space design for the following data for the following dat...
climate analysis of Dhaka ,Banglades.pptx
Data_Analytics_and_PowerBI_Presentation.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Quality review (1)_presentation of this 21
Business Analytics and business intelligence.pdf
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
MODULE 8 - DISASTER risk PREPAREDNESS.pptx

"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016

  • 1. IoT Security Make vs Buy? Feb 2016
  • 2. They Tell Us IoT Will be BIG! Copyright © 2016 Verimatrix, Inc.2
  • 3. Opportunity vs Threat Technical exposure Business risk Customer confidence Regulatory compliance Copyright © 2016 Verimatrix, Inc.3
  • 4. More Connectivity >>> More Threat Surfaces Device control Reprogramming Man in middle • Intercepting communication • Alter communication • Pretend to be a different player Jamming / Blocking Replay Cloning Monitoring Data theft Copyright © 2016 Verimatrix, Inc.4
  • 5. Attacker Incentive Research Hacktivist Economic – Exploits or Crime Terrorism Cyber warfare Copyright © 2016 Verimatrix, Inc.5
  • 6. Attacks: SOHO examples Copyright © 2016 Verimatrix, Inc. FAIL: Management backdoors FAIL: Password vulnerabilities FAIL: Update verification https://www.sohopelesslybroken.com/news.html 6
  • 7. Attacks: Samsung Fridge Copyright © 2016 Verimatrix, Inc. FAIL: test validity of SSL certificate Threat: Neighbor stealing gmail credentials http://www.theregister.co.uk/2015/08/24/smart_fridge_security_fubar/ 7
  • 8. Attacks: Vizio TV Copyright © 2016 Verimatrix, Inc. FAIL: test validity of SSL certificate Threat: Impact on privacy Awareness: 6th link http://arstechnica.com/security/2015/11/man-in-the-middle-attack-on-vizio-tvs-coughs-up-owners-viewing-habits/ 8
  • 9. Attacks: Baby Monitor Copyright © 2016 Verimatrix, Inc. Baby monitor weaknesses overview: http://fusion.net/story/192189/internet-connected-baby-monitors-trivial-to-hack/ Threat: someone close by listening to you baby. 9
  • 10. Attacks: Hue Light Bulb Copyright © 2016 Verimatrix, Inc. Fail: Securing Token Threat Control light – remotely http://www.dhanjani.com/blog/2013/08/hacking-lightbulbs.html 10
  • 11. Attacks: Smart Meter Copyright © 2016 Verimatrix, Inc. Open protocol / credentials Threat: Smart meter data provides info on • Appliance: HDR TV • Occupancy and schedule From: Smart Meter Data: Privacy and Cybersecurity Congressional Research Service R42338 11
  • 12. Attacks: Jeep Copyright © 2016 Verimatrix, Inc. FAIL: No segmentation FAIL: No OTA update http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ Threat: Loosing control in a driving car 12
  • 13. Copyright © 2016 Verimatrix, Inc. Attacks: Cloud 13 …and many others such as Sony
  • 14. IoT Security Snapshot Copyright © 2016 Verimatrix, Inc.14 Device Hardware Security Secure Device Update Secure IP Communications Data Management and Integrity Threat monitoring & response TPM (Trusted Platform Module) and SE (Secure Element)Used to harden software based security solutions in a layered security approach secure storage secure boot Leverages security credentials and signature process to enable a trusted services for full or modular software update Leverages security credentials to provide authenticated client comms end point and connection oriented or connectionless secure communications framework Activity tracking, Signature analysis, flagging threats and orchestrating response Data aggregation, access control and auditing Policy compliance, regulatory compliance
  • 15. IoT Vertical Markets – Generic Challenges Copyright © 2016 Verimatrix, Inc. Cloud data integrity and compliance Threat monitoring And response Secure device communications Secure device update Device integrity Credential mgmnt Smart Home Automotive mHealth Smart Cities Industrial 15
  • 16. Copyright © 2016 Verimatrix, Inc. Who Would You Trust? Not just for Christmas - typical lifetime tasks • Device credential management • Secure software update • Trusted secure IP communications – TCP, UDP, unicast, multicast • Device threat monitoring • Threat reporting/aggregation/alerting • Data curation - secure repository with regulatory and policy compliance Few in the industry with a broad, long term track record 16
  • 17. Copyright © 2016 Verimatrix, Inc. Summary 17 Threat surface of connected systems is extensive The security challenge exists over the lifetime of the application How do you combine innovation and system integrity

Editor's Notes

  • #2: Notes to open: Cans Verimatrix labs Future talks in this framework Patents Virtual reality
  • #4: Router attacks Vizio TV Markey auto report
  • #10: Screaming at a baby
  • #11: What’s the damage
  • #12: Smart Meter Data: Privacy and Cybersecurity Congressional Research Service R42338
  • #14: Mention Sony