SlideShare a Scribd company logo
Scaling Security for IoT
A presentation given
by Bill Harpley to the
Brighton IoT Forum
on March 23rd, 2016
23/03/2016 Bill Harpley 2
02/03/2016 Bill Harpley3
Linux | Cloud | Wireless | IoT
www.astius.co.uk
Overview
• IoT is all about scalability
• In this presentation we will look at two
contrasting views of IoT security:
– Macro level: security of complex physical systems
– Micro level: how to start with a product idea and
scale it up in a secure fashion
23/03/2016 Bill Harpley 4
SECURING BASIC SOCIAL AND
ECONOMIC INFRASTRUCTURE
Scaling Security for IoT
23/03/2016 Bill Harpley 5
Security of large-scale infrastructure
• The diagram shows how traditional
vertical market sectors are embracing
IoT connectivity solutions.
• Cyber-Physical systems – large scale
connected infrastructure which spans
multiple vertical sectors. So how do
you make these secure?
• Significant security challenges in
terms of:
• Different industry standards
• Regulatory regimes
• Legacy infrastructure
• Timing of signals
• Communications protocols
• Proprietary technologies
• System complexity
• Understanding of risks
• Security monitoring
• Co-ordinating multiple agencies
• Many legacy systems were never
intended to be connected to the
Internet and so lack essential security
mechanisms (e.g. SCADA) .
SCADA (Supervisory Control & Data Acquisition) systems are used
to monitor and control industrial processes and buildings. They
were first deployed in the 1960s and some have an expected
working life of up to 20 years.
23/03/2016 Bill Harpley 6
Protecting critical infrastructure
• As more ‘things’ become connected to the Internet,
the threat of large-scale cyber attacks increases.
• Attackers may try to:
– Gain unauthorised access to information.
– Disrupt communication networks and IT services.
– Cause breakdown of physical infrastructure (e.g. energy
distribution grids, major transport hubs).
• Let’s have a look at a topical example!
23/03/2016 Bill Harpley 7
Example: connected cars (1 of 3)
• Cars are evolving from Assisted Driving mode
(ADAS) to fully Autonomous mode (driverless).
• Car makers are cramming their new vehicles with
electronics and software.
– Turning them into mobile data centers.
– Many potential security vulnerabilities.
• Recent report in Information Age that 75% of cars stolen in
France during 2014 were electronically hacked.
• ‘Jeep Hack’ of July 2015 in which vehicle forced off the road
by hackers ( Chrysler recalled 1.4 million cars).
– Rising concern about vulnerability of cars to
cyber-attacks.
23/03/2016 Bill Harpley 8
Example: connected cars (2 of 3)
Source: Cisco
23/03/2016 Bill Harpley 9
Example: connected cars ( 3 of 3)
• Kerbside
infrastructure is
vulnerable to
cyber-attacks.
• Need to protect a
complex “system
of systems”.
• Requires strategy
to be developed at
both local and
national level.
Artist’s visualisation of connected vehicles control point.
Source: US Department of Transport
23/03/2016 Bill Harpley 10
UK Cybersecurity strategy
• Cyber-security features very prominently in Government
thinking.
• Many policy initiatives announced over the last 5 years
– First UK Cyber Security Strategy created in 2009.
– Office of Cyber Security & Information Assurance (OCSIA)
founded in 2010 (located in Cabinet Office)
– National Cyber Security Programme (NSCP) launched in 2010
– CERT-UK began operations in March 2014 (formal incident
reporting).
– 2015 National Cyber Security Plan launched with great fanfare
( budget of £1.9 billion in spending between 2016-2020 )
– Creation of National Centre for Cybersecurity (NCSC) announced
& will open in October 2016.
• Main take-away is that cyber-security is very complex
business which needs leadership at the highest level.
23/03/2016 Bill Harpley 11
NIST notional framework
“Cyber-Physical Systems or ‘smart’ systems are co-engineered interacting networks of physical
and computational components. These systems will provide the foundation of our critical infrastructure, form the
basis of emerging and future smart services, and improve our quality of life in many areas. Cyber-physical systems will
bring advances in personalized health care, emergency response, traffic flow management, and electric power
generation and delivery, as well as in many other areas now just being envisioned.” – NIST (http://www.nist.gov/cps/)
23/03/2016 Bill Harpley 12
SECURITY SCALING
FOR YOUR GREAT PRODUCT IDEA
Scaling Security for IoT
23/03/2016 Bill Harpley 13
It’s a great idea (but is it secure?)
• Let’s suppose you have a great idea
for a new portable music ‘widget’
• Your aim is to provide people with a
great ‘connected’ user experience
• You build a prototype and show it
to potential customers who are
very enthusiastic
• So you then launch a Kickstarter
campaign with a view to making
100 units
• What security management
problems might you run into?
23/03/2016 Bill Harpley 14
Scaling from 1 to 100
• Let’s say you have manufactured and shipped 100
units to your Kickstarter customers
• Your music widget gets rave reviews … but then 3
customers claim to have found a security flaw
– It could be a flaw in your own design or a fault in a 3rd
party module
– You do the right thing and notify all 100 customers but
they don’t seem too inconvenienced by it
– The three customers that complained return their
widget to you, the problem is “fixed” and the unit is
shipped back to them
– Everyone is happy!
23/03/2016 Bill Harpley 15
Scaling from 100 to 1000
• Congratulations! You have attracted some outside investors
and plan a further production run of 1000 units.
• But now things start to go wrong:
– You never had a plan to manage ‘unique’ items such as MAC
addresses and security keys.
– You did not design the product for high-volume manufacture.
– If customers complain about security faults, manual returns and
upgrades are not an option at this scale.
– You need to design a process of remotely upgrading firmware
on each unit.
• Make sure you fix these problems before committing to the
manufacturing run:
– It will take more effort and extend your ‘time to market’
– But should save money in the long run
23/03/2016 Bill Harpley 16
Scaling from 1000 to 10000
• Your music widget is now very popular! You have built and shipped
10,000 units:
– But the product has attracted the attention of malicious hackers
– You need to routinely issue security patches
– Get this one wrong and it will affect profits and brand image
• At this scale, you will begin to see customers raise many more
“marginal” support issues (including obscure security bugs)
– Fixing these can consume a large proportion of your development and
support budget
– Unsold items in stock will also need to be patched with new firmware
to fix security and other problems
– If you have not planned for these issues you will end up losing money
on each new item sold
• Now try scaling up to 100,000 units …
23/03/2016 Bill Harpley 17
Scale your product
• At each stage of production scaling, you should also plan for the next stage
• Implement the principle of ‘security by design’, starting with your first
production batch
• Design your product for high volume manufacturing runs in order to lower
production costs
• Design for the complete security lifecycle of the product
– If a product stores a lot of personal data at end-of-life (or when
re-sold), can this be easily erased?
– Use your management of security & privacy processes as a way to
differentiate yourself from the competition
• Embrace security ‘best practice’ and certification for products and
processes (e.g. ISO 27000)
• Be aware of regulatory requirements in overseas markets
• Can you afford to design, build and support a secure product at your
intended price point?
23/03/2016 Bill Harpley 18
Conclusions
• We have seen that protecting critical social and economic
infrastructure from cyber-attacks is a major priority for the UK
• We have examined how developing secure IoT products can
present startup businesses with many challenges
• What do these two ends of the scale have in common?
– You need to plan ahead and ask ‘What if …?’
– You need to try and understand the risks
– You need to invest adequate resources to meet your goals
– You need to monitor how well your security strategy is
performing
– Put effective processes in place to manage and contain any
security problems
• Whether working at the micro-scale or the macro-scale,
it’s crucial to develop a security mindset
23/03/2016 Bill Harpley 19
Any questions?
bill.harpley@astius.co.uk
23/03/2016 Bill Harpley 20

More Related Content

PDF
What is the Natural Business Model for the Internet of Things - Blair Currie ...
PDF
Addressing Global Chanllenges Through IoT
PPTX
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
PDF
Defining the IoT Stack
PPTX
Data Value Creation in the Industrial IoT
PPTX
7 trends of IoT in 2017
PDF
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
PPTX
Internet of things ecosystem: The quest for value
What is the Natural Business Model for the Internet of Things - Blair Currie ...
Addressing Global Chanllenges Through IoT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Defining the IoT Stack
Data Value Creation in the Industrial IoT
7 trends of IoT in 2017
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
Internet of things ecosystem: The quest for value

What's hot (20)

PDF
IoT security reference architecture
PDF
Industrial IoT is coming
PPTX
Internet of Things Ecosystem
PDF
Intro to IoT-23Sep2015
PDF
IoT Systems: Technology, Architecture & Performance
PDF
IOT and Big Data - The Perfect Marriage
PDF
Presentacion Wim Elfrink IoT World Forum Chicago
PDF
Internet of Things (IoT) - Trends, Challenges and Opportunities
PDF
CyberSecurity_for_the_IoT
PDF
M2M transitioning to IoT opportunity for telcos. Success references.
PDF
IoT Smart Home, Connected Car, Health Patents Data Use Cases
PPTX
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
PDF
Oies IoT World Europe 20170615
PDF
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
PPT
IoT
PDF
Internet of Things (IoT) as a Driver for the Circular Economy – Innovation, Q...
PDF
Smart Cities Day 1 Secure Cities
PDF
Understanding IoT
PDF
Industrial Internet of Things (IIoT)
PPTX
Who will buy IOT products and why.
IoT security reference architecture
Industrial IoT is coming
Internet of Things Ecosystem
Intro to IoT-23Sep2015
IoT Systems: Technology, Architecture & Performance
IOT and Big Data - The Perfect Marriage
Presentacion Wim Elfrink IoT World Forum Chicago
Internet of Things (IoT) - Trends, Challenges and Opportunities
CyberSecurity_for_the_IoT
M2M transitioning to IoT opportunity for telcos. Success references.
IoT Smart Home, Connected Car, Health Patents Data Use Cases
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Oies IoT World Europe 20170615
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
IoT
Internet of Things (IoT) as a Driver for the Circular Economy – Innovation, Q...
Smart Cities Day 1 Secure Cities
Understanding IoT
Industrial Internet of Things (IIoT)
Who will buy IOT products and why.
Ad

Viewers also liked (20)

PDF
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
PDF
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
PDF
Public policy aspects of Connected and Autonomous Vehicles
PPTX
IoT based on cyber security in defense industry and critical infrastructures
ODP
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
PPTX
Principals of IoT security
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
Cyber Security - awareness, vulnerabilities and solutions
PPTX
Cyren cybersecurity of things
PDF
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
PPTX
Get yourself connected: Google Glass and the Internet of Bling
PPTX
Build Safe and Secure Distributed Systems
PPT
Feasible car cyber defense - ESCAR 2010
PDF
FASTR_Overview2017
PPT
Myths vs. Truths at St. Vincent's Hospital
PDF
Building the Social Internet of Things
PDF
Designing for IoT and Cyber-Physical System
PDF
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
PPTX
Cyber Security Architecture - A Systems Approach December 05 2012
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Public policy aspects of Connected and Autonomous Vehicles
IoT based on cyber security in defense industry and critical infrastructures
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Principals of IoT security
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Cyber Security - awareness, vulnerabilities and solutions
Cyren cybersecurity of things
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Get yourself connected: Google Glass and the Internet of Bling
Build Safe and Secure Distributed Systems
Feasible car cyber defense - ESCAR 2010
FASTR_Overview2017
Myths vs. Truths at St. Vincent's Hospital
Building the Social Internet of Things
Designing for IoT and Cyber-Physical System
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
Cyber Security Architecture - A Systems Approach December 05 2012
Ad

Similar to Scaling IoT Security (20)

PPSX
TCI 2016 Softwareport
PDF
Response to Commerce Dept's IoT RFC
PDF
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
PDF
Industrial Internet Nothing or Everything
PDF
[Webinar] Why Security Certification is Crucial for IoT Success
PPTX
Internet of Things: Trends and challenges for future
PDF
BYOD: Be your own device?
PDF
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
PDF
Sss14cairns Prismtech
PPTX
Privacy and Security for the Emerging Internet of Things
PDF
Mobile: the up and downside of risk
PPTX
Cyber Security: Past and Future
PDF
Engineering Large Scale Cyber-Physical Systems
PDF
Innovation at Meraki
PPTX
Lecture 3 Country Specific Strategy.pptx
PPTX
Cyber Security: Past and Future
PDF
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
PDF
Reshaping Business Through IoT: Key Technology Factors to Consider
PDF
Mitre ATT&CK by Mattias Almeflo Nixu
PDF
Mobile: the up and downside of risk
TCI 2016 Softwareport
Response to Commerce Dept's IoT RFC
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
Industrial Internet Nothing or Everything
[Webinar] Why Security Certification is Crucial for IoT Success
Internet of Things: Trends and challenges for future
BYOD: Be your own device?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
Sss14cairns Prismtech
Privacy and Security for the Emerging Internet of Things
Mobile: the up and downside of risk
Cyber Security: Past and Future
Engineering Large Scale Cyber-Physical Systems
Innovation at Meraki
Lecture 3 Country Specific Strategy.pptx
Cyber Security: Past and Future
meet2016: Reshaping Business Through IoT: Key Technology Factors to Consider
Reshaping Business Through IoT: Key Technology Factors to Consider
Mitre ATT&CK by Mattias Almeflo Nixu
Mobile: the up and downside of risk

More from Bill Harpley (7)

PPTX
Marine and coastal applications of LoRa wireless technology
PDF
Connected & Driverless vehicles: the road to Safe & Secure mobility?
PDF
Cybersecurity in the Age of the Everynet
PDF
Hitch-hikers guide to AI for Connected and Autonomous Vehicles
PDF
Introduction to Connected Cars and Autonomous Vehicles
PDF
How to survive the Fourth Industrial Revolution: a guide to Digital Manufactu...
PDF
SME 10-minute guide to digital transformation v1
Marine and coastal applications of LoRa wireless technology
Connected & Driverless vehicles: the road to Safe & Secure mobility?
Cybersecurity in the Age of the Everynet
Hitch-hikers guide to AI for Connected and Autonomous Vehicles
Introduction to Connected Cars and Autonomous Vehicles
How to survive the Fourth Industrial Revolution: a guide to Digital Manufactu...
SME 10-minute guide to digital transformation v1

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Weekly Chronicles - August'25 Week I
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf

Scaling IoT Security

  • 2. A presentation given by Bill Harpley to the Brighton IoT Forum on March 23rd, 2016 23/03/2016 Bill Harpley 2
  • 3. 02/03/2016 Bill Harpley3 Linux | Cloud | Wireless | IoT www.astius.co.uk
  • 4. Overview • IoT is all about scalability • In this presentation we will look at two contrasting views of IoT security: – Macro level: security of complex physical systems – Micro level: how to start with a product idea and scale it up in a secure fashion 23/03/2016 Bill Harpley 4
  • 5. SECURING BASIC SOCIAL AND ECONOMIC INFRASTRUCTURE Scaling Security for IoT 23/03/2016 Bill Harpley 5
  • 6. Security of large-scale infrastructure • The diagram shows how traditional vertical market sectors are embracing IoT connectivity solutions. • Cyber-Physical systems – large scale connected infrastructure which spans multiple vertical sectors. So how do you make these secure? • Significant security challenges in terms of: • Different industry standards • Regulatory regimes • Legacy infrastructure • Timing of signals • Communications protocols • Proprietary technologies • System complexity • Understanding of risks • Security monitoring • Co-ordinating multiple agencies • Many legacy systems were never intended to be connected to the Internet and so lack essential security mechanisms (e.g. SCADA) . SCADA (Supervisory Control & Data Acquisition) systems are used to monitor and control industrial processes and buildings. They were first deployed in the 1960s and some have an expected working life of up to 20 years. 23/03/2016 Bill Harpley 6
  • 7. Protecting critical infrastructure • As more ‘things’ become connected to the Internet, the threat of large-scale cyber attacks increases. • Attackers may try to: – Gain unauthorised access to information. – Disrupt communication networks and IT services. – Cause breakdown of physical infrastructure (e.g. energy distribution grids, major transport hubs). • Let’s have a look at a topical example! 23/03/2016 Bill Harpley 7
  • 8. Example: connected cars (1 of 3) • Cars are evolving from Assisted Driving mode (ADAS) to fully Autonomous mode (driverless). • Car makers are cramming their new vehicles with electronics and software. – Turning them into mobile data centers. – Many potential security vulnerabilities. • Recent report in Information Age that 75% of cars stolen in France during 2014 were electronically hacked. • ‘Jeep Hack’ of July 2015 in which vehicle forced off the road by hackers ( Chrysler recalled 1.4 million cars). – Rising concern about vulnerability of cars to cyber-attacks. 23/03/2016 Bill Harpley 8
  • 9. Example: connected cars (2 of 3) Source: Cisco 23/03/2016 Bill Harpley 9
  • 10. Example: connected cars ( 3 of 3) • Kerbside infrastructure is vulnerable to cyber-attacks. • Need to protect a complex “system of systems”. • Requires strategy to be developed at both local and national level. Artist’s visualisation of connected vehicles control point. Source: US Department of Transport 23/03/2016 Bill Harpley 10
  • 11. UK Cybersecurity strategy • Cyber-security features very prominently in Government thinking. • Many policy initiatives announced over the last 5 years – First UK Cyber Security Strategy created in 2009. – Office of Cyber Security & Information Assurance (OCSIA) founded in 2010 (located in Cabinet Office) – National Cyber Security Programme (NSCP) launched in 2010 – CERT-UK began operations in March 2014 (formal incident reporting). – 2015 National Cyber Security Plan launched with great fanfare ( budget of £1.9 billion in spending between 2016-2020 ) – Creation of National Centre for Cybersecurity (NCSC) announced & will open in October 2016. • Main take-away is that cyber-security is very complex business which needs leadership at the highest level. 23/03/2016 Bill Harpley 11
  • 12. NIST notional framework “Cyber-Physical Systems or ‘smart’ systems are co-engineered interacting networks of physical and computational components. These systems will provide the foundation of our critical infrastructure, form the basis of emerging and future smart services, and improve our quality of life in many areas. Cyber-physical systems will bring advances in personalized health care, emergency response, traffic flow management, and electric power generation and delivery, as well as in many other areas now just being envisioned.” – NIST (http://www.nist.gov/cps/) 23/03/2016 Bill Harpley 12
  • 13. SECURITY SCALING FOR YOUR GREAT PRODUCT IDEA Scaling Security for IoT 23/03/2016 Bill Harpley 13
  • 14. It’s a great idea (but is it secure?) • Let’s suppose you have a great idea for a new portable music ‘widget’ • Your aim is to provide people with a great ‘connected’ user experience • You build a prototype and show it to potential customers who are very enthusiastic • So you then launch a Kickstarter campaign with a view to making 100 units • What security management problems might you run into? 23/03/2016 Bill Harpley 14
  • 15. Scaling from 1 to 100 • Let’s say you have manufactured and shipped 100 units to your Kickstarter customers • Your music widget gets rave reviews … but then 3 customers claim to have found a security flaw – It could be a flaw in your own design or a fault in a 3rd party module – You do the right thing and notify all 100 customers but they don’t seem too inconvenienced by it – The three customers that complained return their widget to you, the problem is “fixed” and the unit is shipped back to them – Everyone is happy! 23/03/2016 Bill Harpley 15
  • 16. Scaling from 100 to 1000 • Congratulations! You have attracted some outside investors and plan a further production run of 1000 units. • But now things start to go wrong: – You never had a plan to manage ‘unique’ items such as MAC addresses and security keys. – You did not design the product for high-volume manufacture. – If customers complain about security faults, manual returns and upgrades are not an option at this scale. – You need to design a process of remotely upgrading firmware on each unit. • Make sure you fix these problems before committing to the manufacturing run: – It will take more effort and extend your ‘time to market’ – But should save money in the long run 23/03/2016 Bill Harpley 16
  • 17. Scaling from 1000 to 10000 • Your music widget is now very popular! You have built and shipped 10,000 units: – But the product has attracted the attention of malicious hackers – You need to routinely issue security patches – Get this one wrong and it will affect profits and brand image • At this scale, you will begin to see customers raise many more “marginal” support issues (including obscure security bugs) – Fixing these can consume a large proportion of your development and support budget – Unsold items in stock will also need to be patched with new firmware to fix security and other problems – If you have not planned for these issues you will end up losing money on each new item sold • Now try scaling up to 100,000 units … 23/03/2016 Bill Harpley 17
  • 18. Scale your product • At each stage of production scaling, you should also plan for the next stage • Implement the principle of ‘security by design’, starting with your first production batch • Design your product for high volume manufacturing runs in order to lower production costs • Design for the complete security lifecycle of the product – If a product stores a lot of personal data at end-of-life (or when re-sold), can this be easily erased? – Use your management of security & privacy processes as a way to differentiate yourself from the competition • Embrace security ‘best practice’ and certification for products and processes (e.g. ISO 27000) • Be aware of regulatory requirements in overseas markets • Can you afford to design, build and support a secure product at your intended price point? 23/03/2016 Bill Harpley 18
  • 19. Conclusions • We have seen that protecting critical social and economic infrastructure from cyber-attacks is a major priority for the UK • We have examined how developing secure IoT products can present startup businesses with many challenges • What do these two ends of the scale have in common? – You need to plan ahead and ask ‘What if …?’ – You need to try and understand the risks – You need to invest adequate resources to meet your goals – You need to monitor how well your security strategy is performing – Put effective processes in place to manage and contain any security problems • Whether working at the micro-scale or the macro-scale, it’s crucial to develop a security mindset 23/03/2016 Bill Harpley 19