IoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security

Size: px
Start display at page:

Download "IoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security"

Transcription

1 IoT and the Implications for Security Inside and Outside the Enterprise Richard Boyer CISO & Chief Architect, Security

2

3 INTERNET OF THINGS

4 THAT S GREAT BUT 4

5 ALL THINGS ARE NOT ALL EQUAL PERVASIVE NOT ALWAYS CONNECTED UNDERPOWERED AND SECURITY IS AN AFTERTHOUGHT

6 PERVASIVENESS OF IoT Creates New Infrastructure Dynamics IoT is on its way to being everywhere Especially in other people s infrastructures where you cannot control, modify or hold them accountable. Welcome to the EXONET The scope of IoT pervasiveness is bigger than the traditional Internet boundaries of internal and external and is a fundamental part of IoT. It exists in this greater exonet

7 WHY IS THIS IMPORTANT? LET S DO THE MATH Gartner 22,000,000,000 - IoT in 2017 * 50% = 11,000,000,000 - Enterprise IoT * 10% = 1,100,000,000 - Sensitive data/mission Critical * 10% = 110,000,000 - In the Exonet HP * 70% = 77,000,000 - IoT w/ security flaws in the Exonet 5,000,000 - Enterprise size companies Assumption Assumption Assumption TOTAL Vulnerable IoT in the Exonet PER ENTERPRISE Other places in the enterprise

8 NOT NECESSARILY ALWAYS CONNECTED, YET CREATING MORE DATA, SOME OF WHICH WILL BE HIGHLY SENSITIVE

9 HOPELESSLY UNDERPOWERED Many IoT devices are low power, low memory, and slow processors Existing security software is too heavy IoT devices may exist in environments where security cannot impact existing infrastructure Existing security paradigms are incompatible IoT devices may have intermittent connectivity Many existing security concepts require significant bandwidth and are always on

10 SECURITY IS AN AFTERTHOUGHT A large percentage of the current IoT, even in the enterprise, is driven by consumer market thinking.* * If you are worried about selling you the next thing, why would I care about the existing thing? According to Gartner, we ll have 20B additional IoT devices in the enterprise in the next three years 1. According to HP, 70% of existing products have security flaws 2.

11 IN IoT, PERHAPS, OUR OLD PARADIGMS NEED RETHINKING

12 WHAT GUIDANCE DO WE HAVE? 5.1 Network Segmentation and Segregation... Network segmentation and Segregation is one of the most effective architectural concepts that an organization can implement to protect its ICS There are four common themes that implement the concept of defense-in-depth Technologies at more than just the network layer. 2. Least privilege and need-to-know. 3. Separate information and infrastructure 4. Implement whitelisting 5.3 Firewalls... Firewalls can further restrict ICS inter-subnet communications between functional security subnets and devices. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to the respective systems and resources within the more sensitive areas. Firewalls for intra-site communications Is this practical in an Exonet world? Absolutely, in some cases. In many cases, probably not

13 A STRATEGIC CHANGE IN IOT SECURITY THINKING DISTRIBUTED TRUST MUTABILITY AUTONOMY DISPOSABILITY

14 IoT NEEDS TO HAVE DISTRIBUTED TRUST BUT FIRST, HOW DOES HIERARCHICAL TRUST WORK? Root Certificate Authority Issues Certificate That is embedded in Browser Issues root certificate to lower level authority The browser then can verify the whole chain and trust the connection to the server Intermediate certificate authorities Web Server Issues root certificate to lower level authority Issues certificate to web server Lower level authorities Even Lower level authorities Issues root certificate to lower level authority Any point of compromise in the trust chain, compromises everything below it Now imagine this when you operate 10,000 s of iot devices 14

15 IoT NEEDS TO HAVE DISTRIBUTED TRUST DISTRIBUTED TRUST ALIGNS WITH DISTRIBUTED IOT Any compromise to any authority Does not compromise the certificates Or any other authority End point receives all parts and assembles certificate. And we already use variations of this commonly in places like P2P networks and things like the space shuttle and aircraft avionics And we can have authorities anywhere 3 or more trust authorities generate part of the certificate and provide to end point 15

16 IoT NEEDS TO HAVE DISTRIBUTED TRUST With IoT distributed trust lays the foundation for identity everywhere in IoT: The more sensitive the data of an IoT device, the more assurance we need that the data is valid and from the expected source (proof of identity) The more inside exonet we are, the greater the risk of communication disruption, reachability and verification. And the more devices we have, the greater our need for devices to perform confident validation between themselves at the edge and beyond. 16

17 MUTABILITY CHANGE THE IoT GAME Question to the audience How many people here apply software patches to their phones and laptops moment they become available? How about in our data centers? Cloud Applications?? Simple answer we don t, the risks are too great. Why is that? 17

18 MUTABILITY CHANGE THE IoT GAME We ve been very good at building fragile applications How many applications are running in the data center UPDATE that restating them takes a 100 step procedure. If we have have a data corruption and have to recover well that s just a disaster Can t we do something different in IoT while a great many of our devices are still simple? 18

19 MUTABILITY CHANGE THE IoT GAME One potential way to address this is to build in mutability from the beginning and operationalize it. Every so often (Monthly? Weekly? Daily?) blow away the software and the firmware and maybe even add or remove functions regularly, operationally. As as we go along and make IoT complex, if we keep this up, we ve now solved so many security and operational risks. 19

20 AUTONOMY THINGS NEED THEIR OWN SPACES Thing Thing Thing Bad guys and malware need to reach your things to do most of their work. Being in a completely separate cryptographic communications space closes many holes. Thing Thing 20

21 DISPOSABILITY In all of security, remediation is probably the hardest task. How do we get back to where we were? How do we fix our problems? How do we do that quickly? Things are not desktops, or servers, or SaaS or any of those traditional human -oriented systems. We need to build many of our things with the assumption, they are, indeed disposable. When something happens, rip and replace. In fact, maybe we should even do this periodically as standard operating procedure

22 BRING IT TOGETHER DISTRIBUTED TRUST MUTABILITY AUTONOMY DISPOSABILITY Distribute Trust so IoT devices can manage identity from anywhere. Make IoT devices mutable so that we can update constantly Put IoT devices inside their own separate security networks separated from their physical network presence with existing low cost protocols. Dispose and replace at the first sign of issue as a standard practice 22

23 BRING IT TOGETHER SAID ANOTHER WAY KNOW IF IDENTITY CHANGES CONSTANTLY UPDATE TO LIMIT ATTACKS KEEP OUR THINGS SEPARATE Make Identity easy and everywhere that way we know compromise occurs By constantly updating and replacing, we limit the scope (or stop) the attack BUILD TO DISPOSE AND REPLACE Devices completely separated from the wild west of our internal and public networks you limit or remove the ability to compromise, what you cannot reach cannot be attacked. Operationalizing hacking is expensive, repeating that success is cheap. When we are able to dispose & replace cheaper than the bad guy, we tilt the costs back into our favor. 23

24 ACCELERATING THE TRANSFORMATION OF IDEAS FROM LAB TO MARKET

Securing IoT in the Enterprise

Securing IoT in the Enterprise Securing IoT in the Enterprise Daniel Miessler May 2017 Securing IoT in the Enterprise Daniel Miessler, IOActive May 2017 About - Infosec for around 18 years - Mostly technical testing and enterprise consulting

More information

F5 Network Security for IoT

F5 Network Security for IoT OVERVIEW F5 Network Security for IoT Introduction As networked communications continue to expand and grow in complexity, the network has increasingly moved to include more forms of communication. This

More information

Networks of Things. J. Voas Computer Scientist. National Institute of Standards and Technology

Networks of Things. J. Voas Computer Scientist. National Institute of Standards and Technology Networks of Things J. Voas Computer Scientist National Institute of Standards and Technology 1 2 Years Ago We Asked What is IoT? 2 The Reality No universally-accepted and actionable definition exists to

More information

Firmware Security: Hot Topics to Watch

Firmware Security: Hot Topics to Watch presented by Firmware Security: Hot Topics to Watch Spring 2018 UEFI Seminar and Plugfest March 26-30, 2018 Presented by Dick Wilkins (Phoenix Technologies, Ltd.) Agenda Introduction UEFI and the IoT Security

More information

IoT Strategy Roadmap

IoT Strategy Roadmap IoT Strategy Roadmap Ovidiu Vermesan, SINTEF ROAD2CPS Strategy Roadmap Workshop, 15 November, 2016 Brussels, Belgium IoT-EPI Program The IoT Platforms Initiative (IoT-EPI) program includes the research

More information

The Art of Low-Cost IoT Solutions

The Art of Low-Cost IoT Solutions The Art of Low-Cost IoT Solutions 13 June 2017 By Igor Ilunin, DataArt www.dataart.com 2017 DataArt Contents Executive Summary... 3 Introduction... 3 The Experiment... 3 The Setup... 4 Analysis / Calculations...

More information

Security of the Internet of Things

Security of the Internet of Things Danish Internet Day Security of the Internet of Things Mitigating infections spread through immunisation techniques Farell FOLLY, Ph.D Researcher folly.farell@unibw.de Copenhague, October 1st.!1 Agenda

More information

Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012

Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012 Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012 Outline 1. Principles of IOT : What and how? 2. Realization of IOT : Framework and design 2 Principles

More information

FOR IOT-DRIVEN & BUSINESS

FOR IOT-DRIVEN & BUSINESS FOR IOT-DRIVEN & BUSINESS INDUSTRIE TRANSFORMATION 4.0 WITH ARIS DR. JULIAN KRUMEICH SENIOR PRODUCT MANAGER ARIS NOVEMBER 13 TH, 2018 INTERNET OF THINGS WHY IT MATTERS? A majority of business processes

More information

IOT TECHNOLOGY AND ITS IMPACT

IOT TECHNOLOGY AND ITS IMPACT Presentation at the ABA National IOT Institute, Jones Day, Washington DC March 30, 2016 IOT TECHNOLOGY AND ITS IMPACT DR. VIJAY K. MADISETTI PROFESSOR OF ELECTRICAL AND COMPUTER ENGINEERING GEORGIA TECH

More information

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Y.4552/Y.2078 (02/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET

More information

administration access control A security feature that determines who can edit the configuration settings for a given Transmitter.

administration access control A security feature that determines who can edit the configuration settings for a given Transmitter. Castanet Glossary access control (on a Transmitter) Various means of controlling who can administer the Transmitter and which users can access channels on it. See administration access control, channel

More information

IERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis)

IERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis) www.internet-of-things-research.eu Standardization Challenges Standards for an Internet of Things 3 and 4 July 2014, ETSI HQ (Sophia Antipolis) Workshop co-organized by EC DG Connect and ETSI Dr. Ovidiu

More information

DRIVING REVENUE FROM THE INTERNET OF THINGS

DRIVING REVENUE FROM THE INTERNET OF THINGS DRIVING REVENUE FROM THE INTERNET OF THINGS There is a significant amount of information available around the subject of The Internet of Things (IoT) or The Internet of Everything (IoE). The UK Government

More information

Building Your DLP Strategy & Process. Whitepaper

Building Your DLP Strategy & Process. Whitepaper Building Your DLP Strategy & Process Whitepaper Contents Introduction 3 DLP Planning: Organize Your Project for Success 3 DLP Planning: Clarify User Profiles 4 DLP Implementation: Phases of a Successful

More information

Securing the Internet of Things Survey

Securing the Internet of Things Survey A SANS Analyst Survey Written by John Pescatore Advisor: Gal Shpantzer January 2014 Sponsored by Norse 2014 SANS Institute Executive Summary The Internet of Things has been attracting a lot of buzz the

More information

Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel

Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel fabiano.hessel@pucrs.br Smart City: Which one? Why? Source: CISCO New Ecosystem The IoT chip market size, in

More information

IoT Technical foundation and use cases Anders P. Mynster, Senior Consultant High Tech summit DTU FORCE Technology at a glance

IoT Technical foundation and use cases Anders P. Mynster, Senior Consultant High Tech summit DTU FORCE Technology at a glance IoT Technical foundation and use cases Anders P. Mynster, apm@force.dk Senior Consultant High Tech summit DTU 2017 FORCE Technology at a glance Internet of Things devices everywhere! Gartners Hype cycle

More information

Four steps to IoT success

Four steps to IoT success Introduction Businesses are using the Internet of Things (IoT) to connect the unconnected. By taking all their electro-mechanical assets and applying a digital layer a layer enabled by the Internet of

More information

DESIGN PHILOSOPHY We had a Dream...

DESIGN PHILOSOPHY We had a Dream... DESIGN PHILOSOPHY We had a Dream... The from-ground-up new architecture is the result of multiple prototype generations over the last two years where the experience of digital and analog algorithms and

More information

DM Scheduling Architecture

DM Scheduling Architecture DM Scheduling Architecture Approved Version 1.0 19 Jul 2011 Open Mobile Alliance OMA-AD-DM-Scheduling-V1_0-20110719-A OMA-AD-DM-Scheduling-V1_0-20110719-A Page 2 (16) Use of this document is subject to

More information

IoT Evidence Acquisition Issues and Challenges

IoT Evidence Acquisition Issues and Challenges Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 1285-1293 Research India Publications http://www.ripublication.com IoT Evidence Acquisition Issues and Challenges

More information

THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO

THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO APRIL 2017 No manufacturer, regardless of size or ingenuity, is immune to technology disruption. The question companies need to ask themselves isn t whether

More information

Ex Libris Rosetta Privacy Impact Assessment

Ex Libris Rosetta Privacy Impact Assessment Ex Libris Rosetta Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents... 2 2 - Disclaimer... 3 3 - Purpose of this document... 4 4 - Main Findings and Conclusions... 4 5 -

More information

ATND Series White Paper

ATND Series White Paper Direct to Dante Protocol Why Dante Consultants, contractors, and end users have long been aware that when they ask for more out of their AV systems, they can expect the cost to rise usually exponentially.

More information

Digital Pathology, The Heart of the Lab, The Birmingham Heartlands Experience. Dr Bruce Tanchel Heart of England NHS Foundation Trust, Birmingham, UK

Digital Pathology, The Heart of the Lab, The Birmingham Heartlands Experience. Dr Bruce Tanchel Heart of England NHS Foundation Trust, Birmingham, UK Digital Pathology, The Heart of the Lab, The Birmingham Heartlands Experience Dr Bruce Tanchel Heart of England NHS Foundation Trust, Birmingham, UK Disclaimer This project is a collaboration with Roche

More information

How to Categorize Risk in IoT

How to Categorize Risk in IoT How to Categorize Risk in IoT Defining use cases for IoT deployments lays the foundation for an end-to-end cybersecurity strategy that cuts across a broad and ever-changing threat landscape 2 Overview

More information

PoE: Adding Power to (IoT)

PoE: Adding Power to (IoT) Sponsored by: PoE: Adding Power to (IoT) Sponsored by: December 20th, 2018 1 Today s Speakers Sponsored by: Steve Bell Senior Analyst - IoT Heavy Reading Mohammad Shahid Khan Chief Manager (PLM & AE),

More information

Internet of Things Conceptual Frameworks and Architecture

Internet of Things Conceptual Frameworks and Architecture Internet of Things Conceptual s and Architecture 1 An IoT Conceptual Physical Object + Controller, Sensor and Actuators + Internet = Internet of Things (1.1) Source: An equation given by Adrian McEwen

More information

Ex Libris. Aleph Privacy Impact Assessment

Ex Libris. Aleph Privacy Impact Assessment Ex Libris Aleph Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents...2 2 - Disclaimer...3 3 - Purpose of this document...4 4 - Main Findings and Conclusions...4 5 - Scope

More information

ITU-T Y Functional framework and capabilities of the Internet of things

ITU-T Y Functional framework and capabilities of the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2068 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2015) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl Security Challenges in the Internet of Things Dr. Sigrid Schefer-Wenzl Agenda Introduction Problem statement Open Internet of Things (IoT) Architecture Use Cases for Smart Cities Security Challenges Conclusions

More information

The Pathway To Ultrabroadband Networks: Lessons From Consumer Behavior

The Pathway To Ultrabroadband Networks: Lessons From Consumer Behavior The Pathway To Ultrabroadband Networks: Lessons From Consumer Behavior John Carey Fordham Business Schools Draft This paper begins with the premise that a major use of ultrabroadband networks in the home

More information

Chapter 2. Analysis of ICT Industrial Trends in the IoT Era. Part 1

Chapter 2. Analysis of ICT Industrial Trends in the IoT Era. Part 1 Chapter 2 Analysis of ICT Industrial Trends in the IoT Era This chapter organizes the overall structure of the ICT industry, given IoT progress, and provides quantitative verifications of each market s

More information

Alcatel-Lucent 5910 Video Services Appliance. Assured and Optimized IPTV Delivery

Alcatel-Lucent 5910 Video Services Appliance. Assured and Optimized IPTV Delivery Alcatel-Lucent 5910 Video Services Appliance Assured and Optimized IPTV Delivery The Alcatel-Lucent 5910 Video Services Appliance (VSA) delivers superior Quality of Experience (QoE) to IPTV users. It prevents

More information

IoT Challenges & Testing aspects. Alon Linetzki, Founder & CEO QualityWize

IoT Challenges & Testing aspects. Alon Linetzki, Founder & CEO QualityWize IoT Challenges & Testing aspects Alon Linetzki, Founder & CEO QualityWize alonl@quality-wize.com 1 Alon Linetzki CEO and Founder of QualityWize 3 decades in sw engineering, testing, quality assurance and

More information

Network and IT Infrastructure Services for the IoT Store

Network and IT Infrastructure Services for the IoT Store Network and IT Infrastructure Services for the IoT Store Gaël Fromentoux and Nathalie Omnès (&) Orange Labs, 2 avenue Pierre Marzin, 22 300 Lannion, France {gael.fromentoux,nathalie.omnes}@orange.com Abstract.

More information

Redwall. Technologies LLC

Redwall. Technologies LLC Redwall Technologies LLC Redwall Mobile : Secure Mobile Technology Quick Brief 2015 Redwall Technologies LLC This material is for information purposes only and does not constitute and offer to sell any

More information

Internet of Things Telecommunication operator perspective

Internet of Things Telecommunication operator perspective Internet of Things Telecommunication operator perspective Pierre Rust 1 MINES Saint-Étienne, CNRS Lab Hubert Curien UMR 5516 2 Orange Labs UMR CNRS 5516 SAINT-ETIENNE Goal: Giving you overview of the perspective

More information

SUBVERSIVE MANUFACTURERS COULD RUIN YOUR BUSINESS OPERATORS FACE FINES AND SHUTDOWNS DUE TO FCC CHEAT

SUBVERSIVE MANUFACTURERS COULD RUIN YOUR BUSINESS OPERATORS FACE FINES AND SHUTDOWNS DUE TO FCC CHEAT SUBVERSIVE MANUFACTURERS COULD RUIN YOUR BUSINESS OPERATORS FACE FINES AND SHUTDOWNS DUE TO FCC CHEAT v042717 2017 1015 Maple Street, Danville, IL 61832 800-637-2645 watchfiresigns.com CONTENTS 01 Why

More information

Internet of Things: Cross-cutting Integration Platforms Across Sectors

Internet of Things: Cross-cutting Integration Platforms Across Sectors Internet of Things: Cross-cutting Integration Platforms Across Sectors Dr. Ovidiu Vermesan, Chief Scientist, SINTEF DIGITAL EU-Stakeholder Forum, 31 January-01 February, 2017, Essen, Germany IoT - Hyper-connected

More information

Enduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk

Enduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk Enduring the IoT storm to unlock new paths to value How a governance model protects you from a blizzard of IoT risk Contents In the eye of the IoT storm 2 IoT governance basics 5 Navigating through the

More information

DATA LOSS PREVENTION: A HOLISTIC APPROACH

DATA LOSS PREVENTION: A HOLISTIC APPROACH DATA LOSS PREVENTION: A HOLISTIC APPROACH Introduction Data breach has been one of the biggest fears that organizations face today. While DLP is not a panacea to such attacks, it should certainly be in

More information

Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission

Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE MSB Conference Oct 11, 2016 Frankfurt International Electrotechnical Commission Approach The IEC MSB decided to write a paper on Smart and Secure IoT

More information

Evaluation: Polycom s Implementation of H.264 High Profile

Evaluation: Polycom s Implementation of H.264 High Profile Evaluation: Polycom s Implementation of H.264 High Profile WR Investigates Polycom s Claim of No-Compromise Performance Using up to 50% Less Bandwidth November 2010 Study sponsored by: Table of Contents

More information

Choosing an Oscilloscope

Choosing an Oscilloscope Choosing an Oscilloscope By Alan Lowne CEO Saelig Company (www.saelig.com) Post comments on this article at www.nutsvolts.com/ magazine/article/october2016_choosing-oscilloscopes. All sorts of questions

More information

MIDTERM EXAMINATION CS504- Software Engineering - I (Session - 6) Question No: 1 ( Marks: 1 ) - Please choose one By following modern system engineering practices simulation of reactive systems is no longer

More information

ITU-T Y Specific requirements and capabilities of the Internet of things for big data

ITU-T Y Specific requirements and capabilities of the Internet of things for big data I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4114 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

Explain Hacking in 10 minutes Lorenzo Grespan. OWASP Newcastle November 2017

Explain Hacking in 10 minutes Lorenzo Grespan. OWASP Newcastle November 2017 Explain Hacking in 10 minutes Lorenzo Grespan OWASP Newcastle November 2017 The Challenge Do a live hack In front of a public audience Business students and academics Ten minutes Bonus points: in a different

More information

Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT

Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT AIIA feedback October 2017 Ground Suite B 7-11 Barry Drive Turner ACT 2612 GPO Box 573 Canberra ACT 2601 61 2 6281 9400

More information

DELL: POWERFUL FLEXIBILITY FOR THE IOT EDGE

DELL: POWERFUL FLEXIBILITY FOR THE IOT EDGE DELL: POWERFUL FLEXIBILITY FOR THE IOT EDGE ABSTRACT Dell Edge Gateway 5000 Series represents a blending of exceptional compute power and flexibility for Internet of Things deployments, offering service

More information

White Paper. Video-over-IP: Network Performance Analysis

White Paper. Video-over-IP: Network Performance Analysis White Paper Video-over-IP: Network Performance Analysis Video-over-IP Overview Video-over-IP delivers television content, over a managed IP network, to end user customers for personal, education, and business

More information

IMPLEMENTATION OF SIGNAL SPACING STANDARDS

IMPLEMENTATION OF SIGNAL SPACING STANDARDS IMPLEMENTATION OF SIGNAL SPACING STANDARDS J D SAMPSON Jeffares & Green Inc., P O Box 1109, Sunninghill, 2157 INTRODUCTION Mobility, defined here as the ease at which traffic can move at relatively high

More information

PERFACTORY Rapid Prototyping System. Troubleshooting Guide. PERFACTORY Machine

PERFACTORY Rapid Prototyping System. Troubleshooting Guide. PERFACTORY Machine PERFACTORY Rapid Prototyping System Troubleshooting Guide PERFACTORY Machine Envisiontec GmbH Elbestraße 10 D-46768 Marl Germany Phone:+49 2365 915460 Email:support@envisiontec.de Disclaimer This troubleshooting

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 01 Introduction to IoT-Part 1 So, the first lecture

More information

OEM Basics. Introduction to LED types, Installation methods and computer management systems.

OEM Basics. Introduction to LED types, Installation methods and computer management systems. OEM Basics Introduction to LED types, Installation methods and computer management systems. v1.0 ONE WORLD LED 2016 The intent of the OEM Basics is to give the reader an introduction to LED technology.

More information

DEDICATED TO EMBEDDED SOLUTIONS

DEDICATED TO EMBEDDED SOLUTIONS DEDICATED TO EMBEDDED SOLUTIONS DESIGN SAFE FPGA INTERNAL CLOCK DOMAIN CROSSINGS ESPEN TALLAKSEN DATA RESPONS SCOPE Clock domain crossings (CDC) is probably the worst source for serious FPGA-bugs that

More information

Comments of the Authors Guild, Inc. Submitted by Mary Rasenberger, Executive Director

Comments of the Authors Guild, Inc. Submitted by Mary Rasenberger, Executive Director Before the Copyright Office Library of Congress In the Matter of ) ) Mandatory Deposit of Electronic Books Available Only Online ) Docket No. 2016-3 ) Comments of the Authors Guild, Inc. Submitted by Mary

More information

The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance

The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices Beverly Kracher, Ph.D. Business Ethics Alliance Creighton University Omaha, Nebraska 68178 402-280-2235 beverlykracher@gmail.com

More information

RevolutionaryText delivers a SaaS-oriented, patent-pending process developed by Reesa Parker, William Weber, and Harvey Schulman.

RevolutionaryText delivers a SaaS-oriented, patent-pending process developed by Reesa Parker, William Weber, and Harvey Schulman. RevolutionaryText, LLC RevolutionaryText delivers a SaaS-oriented, patent-pending process developed by Reesa Parker, William Weber, and Harvey Schulman. RevolutionaryText Leadership Reesa Parker, President

More information

IoT Strategy for CSPs Seeking Greater IoT Monetization

IoT Strategy for CSPs Seeking Greater IoT Monetization IoT Strategy for CSPs Seeking Greater IoT Monetization Joern Kropfgans Partner Communications Sector, IBM Services Raj Cherchattil CTO, Telecom, Media & Entertainment, IBM 2018 TM Forum 1 Beyond connectivity

More information

DETEXI Basic Configuration

DETEXI Basic Configuration DETEXI Network Video Management System 5.5 EXPAND YOUR CONCEPTS OF SECURITY DETEXI Basic Configuration SETUP A FUNCTIONING DETEXI NVR / CLIENT It is important to know how to properly setup the DETEXI software

More information

Intelsat-29e Interference Mitigation Testing. Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites

Intelsat-29e Interference Mitigation Testing. Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites Intelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites Introduction Networks are constantly under attack from entities

More information

Interview with Panos Panay For podcast release August 1, 2016

Interview with Panos Panay For podcast release August 1, 2016 1 Interview with Panos Panay For podcast release August 1, 2016 KENNEALLY: In Boston, a single mile and 17 years separate two technology initiatives with the power to reshape the music industry. The first

More information

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017 Internet of things (IoT) Regulatory aspects 1 Trilok Dabeesing, ICT Authority 28 June 2017 2 IoT Regulatory aspects IoT - the interconnection via the Internet of computing devices embedded in everyday

More information

MY OPENING KEYNOTE AT INTERNET OF THING S WORLD 2016

MY OPENING KEYNOTE AT INTERNET OF THING S WORLD 2016 MY OPENING KEYNOTE AT INTERNET OF THINGS WORLD 2016 EPISODE 53 PODCAST TRANSCRIPT Slide 1: Welcome Slide 2: Build a better mousetrap, and the world will beat a path to your door. This quote is attributed

More information

Intelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites

Intelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites Intelsat-29e Interference Mitigation Testing Interference Scenarios and Mitigation Techniques Enabled by the Intelsat Epic NG Class Satellites 7922-Inteference-Mitigation Introduction Networks are constantly

More information

What is TEMPEST Chapter 1

What is TEMPEST Chapter 1 TEMPEST Engineering and Hardware Design Dr. Bruce C. Gabrielson, NCE 1998 What is TEMPEST Chapter 1 Introduction This text presents an overall introduction to classical information theory, basic communications

More information

IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director. Mobile IoT: 3GPP standard per reti LPWA e IoT security

IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director. Mobile IoT: 3GPP standard per reti LPWA e IoT security IoThings Milano Maggio 2017 Barbara Pareglio GSMA IoT Technical Director Mobile IoT: 3GPP standard per reti LPWA e IoT security 2 Introduction of the GSMA Content Understanding IoT and the market opportunity

More information

AXIS M30 Series AXIS M3015 AXIS M3016. User Manual

AXIS M30 Series AXIS M3015 AXIS M3016. User Manual AXIS M3015 AXIS M3016 User Manual Table of Contents About this manual.......................................... 3 Product overview........................................... 4 How to access the product....................................

More information

Remote Director and NEC LCD3090WQXi on GRACoL Coated #1

Remote Director and NEC LCD3090WQXi on GRACoL Coated #1 Off-Press Proof Application Data Sheet Remote Director and NEC LCD3090WQXi on GRACoL Coated #1 The IDEAlliance Print Properties Working Group has established a certification process for off-press proofs

More information

Architecture of Industrial IoT

Architecture of Industrial IoT Architecture of Industrial IoT December 2, 2016 Marc Nader @mourcous Branches of IoT IoT Consumer IoT (Wearables, Cars, Smart homes, etc.) Industrial IoT (IIoT) Smart Gateways Wireless Sensor Networks

More information

Agilent I 2 C Debugging

Agilent I 2 C Debugging 546D Agilent I C Debugging Application Note1351 With embedded systems shrinking, I C (Inter-integrated Circuit) protocol is being utilized as the communication channel of choice because it only needs two

More information

New forms of video compression

New forms of video compression New forms of video compression New forms of video compression Why is there a need? The move to increasingly higher definition and bigger displays means that we have increasingly large amounts of picture

More information

Emerging IoT Technologies for Smart Cities

Emerging IoT Technologies for Smart Cities 07.11.2017 U4IoT Contact Dr sziegler@mandint.org IoT-related International Engagement ITU-T Member Rapporteur on Research and Emerging Technologies for the Internet of Things and Smart Cities (SG20) Cybersecurity

More information

Addressing the technical challenges for enterprises deploying IoT solutions

Addressing the technical challenges for enterprises deploying IoT solutions 15th-16th November 2016, Doubletree by Hilton Tower Bridge London Addressing the technical challenges for enterprises deploying IoT solutions 20+ expert speakers Including Hive, ING, Stanley Black & Decker

More information

Cie L*48.57 a* b* Covering the World. Solutions for paint and coatings color management

Cie L*48.57 a* b* Covering the World. Solutions for paint and coatings color management Cie L*48.57 a* 75.62 b* 57.58 Covering the World Solutions for paint and coatings color management Color is a Difference Maker Whether establishing a corporate identity, a brand, a new product, color has

More information

P1: OTA/XYZ P2: ABC c01 JWBK457-Richardson March 22, :45 Printer Name: Yet to Come

P1: OTA/XYZ P2: ABC c01 JWBK457-Richardson March 22, :45 Printer Name: Yet to Come 1 Introduction 1.1 A change of scene 2000: Most viewers receive analogue television via terrestrial, cable or satellite transmission. VHS video tapes are the principal medium for recording and playing

More information

AXIS M30 Network Camera Series. AXIS M3046-V Network Camera. AXIS M3045 V Network Camera. User Manual

AXIS M30 Network Camera Series. AXIS M3046-V Network Camera. AXIS M3045 V Network Camera. User Manual AXIS M3044-V Network Camera AXIS M3045 V Network Camera AXIS M3046-V Network Camera User Manual Table of Contents About this manual.......................................... 3 System overview............................................

More information

The Internet of Things (IoT) has many potential implications for the manufacturing sector. Revolution in the making

The Internet of Things (IoT) has many potential implications for the manufacturing sector. Revolution in the making An article from the Economist Intelligence Unit The digitisation of manufacturing holds the potential to spur a new industrial revolution, many believe. Manufacturers are still working on the foundations,

More information

HOW TO DELIVER OMNICHANNEL CUSTOMER ENGAGEMENT, TODAY! , Genesys Telecommunications Laboratories, Inc. All rights reserved.

HOW TO DELIVER OMNICHANNEL CUSTOMER ENGAGEMENT, TODAY! , Genesys Telecommunications Laboratories, Inc. All rights reserved. HOW TO DELIVER OMNICHANNEL CUSTOMER ENGAGEMENT, TODAY! 1 1 2016, Genesys Telecommunications Laboratories, Inc. All rights reserved. AGENDA Why omnichannel customer engagement The vision and path to success

More information

Last Edit: 19 Feb 2018

Last Edit: 19 Feb 2018 Last Edit: 19 Feb 2018 MOBILE IoT INITIATIVE ECOSYSTEM Over 2100 GSMA Mobile IoT Innovator Company Members 47 IoT Labs In 21 countries INDUSTRY-WIDE SUPPORT Support for Mobile IoT from 98 MNOs And vendors

More information

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

IOT TECHNOLOGY & BUSINESS. Format: Online Academy. Duration: 5 Modules

IOT TECHNOLOGY & BUSINESS. Format: Online Academy. Duration: 5 Modules IOT TECHNOLOGY & BUSINESS Format: Online Academy Duration: 5 Modules IOT TECHNOLOGY & BUSINESS PROGRAMME COURSE OVERVIEW IoT is the next big thing for both operators and associated industries. However

More information

IoT Architecture for Future Building Management Embedded Lighting Controls

IoT Architecture for Future Building Management Embedded Lighting Controls 6 th International LED professional Symposium +Expo Sept 20-22, 2016 Bregenz IoT Architecture for Future Building Management Embedded Lighting Controls Walter WERNER Werner Management Services e.u., Dornbirn,

More information

Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill

Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill White Paper Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill May 2009 Author David Pemberton- Smith Implementation Group, Synopsys, Inc. Executive Summary Many semiconductor

More information

HEART ATTACK DETECTION BY HEARTBEAT SENSING USING INTERNET OF THINGS : IOT

HEART ATTACK DETECTION BY HEARTBEAT SENSING USING INTERNET OF THINGS : IOT HEART ATTACK DETECTION BY HEARTBEAT SENSING USING INTERNET OF THINGS : IOT K.RAJA. 1, B.KEERTHANA 2 AND S.ELAKIYA 3 1 AP/ECE /GNANAMANI COLLEGE OF TECHNOLOGY 2,3 AE/AVS COLLEGE OF ENGINEERING Abstract

More information

SIX DEGREES OF SEPARATION PLANNING THE IMPACT OF IOT ON YOUR FUTURE AUDITS

SIX DEGREES OF SEPARATION PLANNING THE IMPACT OF IOT ON YOUR FUTURE AUDITS SIX DEGREES OF SEPARATION PLANNING THE IMPACT OF IOT ON YOUR FUTURE AUDITS AGENDA What is 6 Degrees of Separation What is IoT The Impact of IoT Risks Auditing IoT WHAT IS 6 DEGREES OF SEPARATION? The idea

More information

Analyzing 8b/10b Encoded Signals with a Real-time Oscilloscope Real-time triggering up to 6.25 Gb/s on 8b/10b encoded data streams

Analyzing 8b/10b Encoded Signals with a Real-time Oscilloscope Real-time triggering up to 6.25 Gb/s on 8b/10b encoded data streams Presented by TestEquity - www.testequity.com Analyzing 8b/10b Encoded Signals with a Real-time Oscilloscope Real-time triggering up to 6.25 Gb/s on 8b/10b encoded data streams Application Note Application

More information

Arrangements for: National Progression Award in. Music Performing (SCQF level 6) Group Award Code: G9L6 46. Validation date: November 2009

Arrangements for: National Progression Award in. Music Performing (SCQF level 6) Group Award Code: G9L6 46. Validation date: November 2009 Arrangements for: National Progression Award in Music Performing (SCQF level 6) Group Award Code: G9L6 46 Validation date: November 2009 Date of original publication: January 2010 Version 02 (September

More information

Internet of Things - IoT Training

Internet of Things - IoT Training Internet of Things - IoT Training About Cognixia Cognixia, formerly known as Collabera TACT, is a Collabera Learning Solutions Company. Being a consistently awarded Digital Technology Training Company,

More information

Requirements for the Standardization of Hybrid Broadcast/Broadband (HBB) Television Systems and Services

Requirements for the Standardization of Hybrid Broadcast/Broadband (HBB) Television Systems and Services EBU TECH 3338 Requirements for the Standardization of Hybrid Broadcast/Broadband (HBB) Television Systems and Services Source: Project Group D/WT (Web edia Technologies) Geneva January 2010 1 Page intentionally

More information

ADDRESSING THE CHALLENGES OF IOT DESIGN JEFF MILLER, PRODUCT MARKETING MANAGER, MENTOR GRAPHICS

ADDRESSING THE CHALLENGES OF IOT DESIGN JEFF MILLER, PRODUCT MARKETING MANAGER, MENTOR GRAPHICS ADDRESSING THE CHALLENGES OF IOT DESIGN JEFF MILLER, PRODUCT MARKETING MANAGER, MENTOR GRAPHICS A M S D E S I G N & V E R I F I C A T I O N W H I T E P A P E R w w w. m e n t o r. c o m INTRODUCTION Internet

More information

VideoEase HDMI 3x1 Switcher Kit (110V) Installation Guide

VideoEase HDMI 3x1 Switcher Kit (110V) Installation Guide VideoEase HDMI 3x1 Switcher Kit 500410 (110V) Installation Guide P/N: 94-00628-A SE-000627-A Copyright Notice : Copyright 2008 MuxLab Inc. All rights reserved. Printed in Canada. No part of this publication

More information

Machina Research. INDUSTRY DAY - Welcome. Emil Berthelsen, Principal Analyst Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016

Machina Research. INDUSTRY DAY - Welcome. Emil Berthelsen, Principal Analyst Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016 Machina Research INDUSTRY DAY - Welcome Emil Berthelsen, Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016 Some of our clients Machina Research 2 Four IoT technology vectors which are transforming markets

More information

Internet of Things (IoT) and Big Data DOAG 2016 Big Data Days

Internet of Things (IoT) and Big Data DOAG 2016 Big Data Days 30.9.2016 DOAG 2016 Big Data Days Guido Schmutz BASEL BERN BRUGG DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. GENEVA HAMBURG COPENHAGEN LAUSANNE MUNICH STUTTGART VIENNA ZURICH Guido Schmutz Working for Trivadis

More information

Internet of Things (IoT) Vikram Raval GSMA

Internet of Things (IoT) Vikram Raval GSMA Internet of Things (IoT) Vikram Raval GSMA Introductions 2 Your objectives What do you expect to learn from this course? How is it relevant to you? 3 Themes Understanding the benefits IoT can bring Key

More information

EdgeConnect Module Quick Start Guide ITERIS INNOVATION FOR BETTER MOBILITY

EdgeConnect Module Quick Start Guide ITERIS INNOVATION FOR BETTER MOBILITY EdgeConnect Module Quick Start Guide ITERIS INNOVATION FOR BETTER MOBILITY 493456301 Rev B April 2009 Table of Contents Installation... 1 Setup... 2 Operation... 4 Live Video... 4 Video Settings... 5 Network

More information

Integrating Device Connectivity in IoT & Embedded devices

Integrating Device Connectivity in IoT & Embedded devices Leveraging Microsoft Cloud for IoT and Embedded Applications Integrating Device Connectivity in IoT & Embedded devices Tom Zamir IoT Solutions Specialist tom@iot-experts.net About me Tom Zamir IoT Solutions

More information

NDT Meets the Internet of Things (IoT)

NDT Meets the Internet of Things (IoT) NDT Meets the Internet of Things (IoT) Steve Strachan * Vice President - Sales Sensor Networks, Inc. Boalsburg, PA * Presented by Bruce Pellegrino Agenda IoT explained Everyday IoT examples IoT meets NDT

More information