Business Value from Big Data

Report 1 Downloads 322 Views
Building the Internet of SECURE Things

WWW.CENTREXIT.COM [email protected]

SIOT Agenda 

Introduction



Current State of IoT



Current State of Cybersecurity



Where is this leading us? 

Medical Products



Healthcare



Home Automotion



Automotive



Macro Trends and Examples



Best Practices

Some Technology predictions from the past

This Just In……

What is the Internet of Things?

IoT is the Future

IoT is the past too

Cybersecurity 5 years ago…. Identify

Confidentiality

Protect

CIA

Detect

Respond

Recover

Integrity

Availability

Cybersecurity Today…. Confidentiality Identify

Protect

Detect

Respond

Recover

Hacking is Big Business  19 Individuals on FBI most wanted cyber criminals list responsible for $100million in losses  Most expensive virus of all time: MyDoom: $38.5 Billion

CIA Integrity

Availability

New Capabilities  Single-Sign-On  Cloud Access Security Brokers (CASB)  MSSP  Event Logging / Monitoring  Outsourcing Options  Anomalitics  Cloud Delivery of Security Solutions  Automated Vulnerability Detection  New Regulatory Requirements

Cybersecurity in 2020

Safety adds an additional element of responsibility for cybersecurity teams and organizations. Protection of privacy, health and human life becomes a major focus for security.

Confidentiality

Executives and Boards will have to be more aware of the cyber threat landscape. Cyber Risk will drive decision making much like financial risk has influenced IT over the past 10 years driven by SOX and HIPAA.

Safety

Integrity

CIAS Availability

Drivers for change in cyber Emerging technologies with safety concerns:  Past technologies generally have some manual / human interaction to control quality.  OT has been focused on cloud and –as-a-service delivery models.  IoT has leapfrogged traditional OT and is driving the industry  In the future, autonomous computing, sensor grids, IoT devices and the like will become life critical.

Where is this taking us – Medical Products

COPD is the 3rd leading cause of death in the US. COPD affects 24 Million Americans

What could go wrong?

Where is this taking us – Healthcare

What could go wrong?

Where is this taking us – Home Automation Internet connected entertainment “Smart” Thermostat “Smart” Lighting Home Security Sprinklers / Landscaping Smart Appliances

What could go wrong?

Where is this taking us – Automotive  By 2020 152 Million connected cards  69% of consumers want a connected car  26% reduction in travel time  79% reduction in crashes

What could go wrong?

Where is this taking us?

What could Possibly go wrong? The IoT is introducing new risks at a rate never seen in human history.

Examples:  Connected Car Crash  Smart Home Disaster  Healthcare Data Modification  Pacemaker  Infusion Pump  Power Grid Failure  Child Protective Services “Extended loss of power to the nation is a SovereigntyEnding event” - U.S. Congress

Challenges 

Rapid pace of IoT Development



Consumer-driven innovation



Little perceived value in cybersecurity as compared to innovation



Cost of securing a new technology



Inequality in global laws



Immature regulation and enforcement



High reward / little risk



Diverse Cloud Delivery Models

Opportunities Our “Moon Shot”  Get it right (this time)!  New Business Opportunities ($4T) 

New technologies are needed  Possibilities we haven’t considered  Protect National Security  Protect Population Health  Protect Individual Health  Limitless promise of technology 

Actions for Today Identify

Protect

Detect

 Awareness, Awareness, Awareness  Talk about security with your company  Take it to the C-Suite  Inventory your Devices and Applications  Build a Threat Model  Conduct a Risk Assessment  Harden Systems  Re-Define your Perimeter  RBAC  Security Event Management  Document acceptable baselines  Anomaly Detection

Respond

Recover

 Build an Incident Response Plan  Test your Incident Response Plan  Build Cybersecurity into your BCP

Thank you! Ford Winslow

Chief Business Officer centrexIT www.centrexit.com [email protected] 619-651-8730

What won’t change Soon? 

Position your data strategically





Locate near major internet hubs (NAPs)



Database / File Management Storage

Processing Network

Datacenter

Office / Lab / Mobile

Big Data is the new Normal Technology Drivers 

Ability to generate more data



Dropping Storage Costs



Access to High-Speed Bandwidth



Internet of Things



New Analytical Tools

Market Drivers 

“Industrial Internet” - $15 Trillion added to Global GDP over next 20 years. - GE



152 Million cars connected to the internet by 2020



By 2020 100 million internet connected light bulbs



40 Billion Internet Connected Devices by 2020

What can you do today? Plan – Start with the end in mind; Use the data you collect, collect the data your are going to use.

People – Users, Data Scientists, Internal Consumers, IT

Process – Create, Store, Analyze, transmit, Modify Technology – Storage, Processing, Networks, Analytics, Reporting

Data – Location, Size, Type, Regulation

What does Big Data Mean To your Business? The Promise: • Key asset for your business • Build Future Value • New Products / Services • Long-Term Gold Mine • Access to New Markets • Big Data = Big ROI

The Challenges: • Large, Complex Datasets • Many Data Standards • Many Applications • Costly Infrastructure • Uncertain Future • Regulation and Compliance

The Big Data Hype Cycle “While interest in big data remains undiminished, it has moved beyond the peak because the market has settled into a reasonable set of approaches, and the new technologies and practices are additive to existing solutions.” – Gartner

“5 to 10 years to maturity may indicate that Gartner is not entirely confident that the market has indeed “settled.”” – Tom Davenport

Watch for Game Changers Example - Memristor  2008 – Quiet announcement in “Nature” by HP.  2008 – 2018 – HP and IBM are developing commercial products leveraging this technology  2018 – projected availability “100TB Drives by 2018 – If you’re lucky” - HP

Don’t Forget Compliance  Anticipate

and Respect Compliance Context  Look for Hidden Risk  Data Chain of Custody and Provenance  Record Retention  If it isn’t written down, it didn’t happen  Watch for Security Requirements