Post on 21-May-2020
1 | Copyright © 2019
SAFEGUARDING THE INTERNET OF THINGS
Managing the cyber challenges of today
November 2019
2 | Copyright © 2019
What is IOT?
3 | Copyright © 2019
THE EDGE
4 | Copyright © 2019
INTERNET OF THINGS /ˈɪn·tərˌnet ɑv θɪŋ/: the network of physical elements and their virtual identities that collectively capture quality data, analyze insightful information, and trigger actionable decisions for optimal outcome
5 | Copyright © 2019
IOT: END TO END SOLUTIONS THAT DRIVES BUSINESS INNOVATION & VALUE Internet of Things refers to a world of intelligent, connected devices generating data for use in new services where these devices generate actionable insights or triggers that enable value creation through new business processes and business model innovation opportunities
5
Business Process & Business Model Innovation
Sensors NetworksDevices Platforms Data Applications & Analytics
6 | Copyright © 2019
MAKING SENSE OF THE BUZZWORDS
Internet of Things (IoT) refers to a world of intelligent, connected devices generating data for use in new services, where intelligent devices generate actionable insights or triggers based on input stimuli
INPUTS
Environmental stimuli
Remote control
Trigger from another connected device
INTELLIGENT DEVICE
OUTPUTS
Senses
Learns / Adapts
Reports
Communicates
Usage Data to Device / 3rd Party
Usage Report to User
Command for Another Connected Device
7 | Copyright © 2019
WHAT HAPPENS IN AN INTERNET MINUTE?
8 | Copyright © 2019
$1.3BPotential growth in
worldwide IoT sensor
deployment for CRE
by 2020
5.5MNew things connected
to the network each
day
20.8BThe estimated
number of connected
devices by 2020
10%The percentage of
global data
produced by
machines by 2020
1/3Enterprises
reporting the use
IoT, with another
third planning to do
so
REALITY OF IOT MAY BE BETTER THAN JUST A ‘BUZZ’ OR ‘HYPE’
http://www.agileinsights.com/content/pdfs/mjeffery%20Handbook%20ROI%20Chapter%20v3.pdf
Gartner: “Forecast: Internet of
Things, endpoints and associated
services, Worldwide, 2015”
--October 29. 2015
Computer Weekly: Data set to
grow 10-fold by 2020 as Internet of
Things takes off”
--April 9, 2014
Gartner Press Release: “Gartner
Says 6.4 Billion Connected ‘Things’
Will Be in Use in 2016, Up 30
Percent From 2015”
Gartner Press Release: “Gartner
Says 6.4 Billion Connected ‘Things’
Will Be in Use in 2016, Up 30
Percent From 2015”
Forrester: Predictions 2016:
IoT's Impact Inside Companies
–November 16, 2015
9 | Copyright © 2019
IOT Use cases
10 | Copyright © 2019
SOME WAYS INDUSTRIES ARE ALREADY THINKING BIG WITH IOT
Below are some of the use cases we have compiled of how enterprises across industries are driving value and making an impact through IoT applications
FINANCIAL SERVICES
ENERGY & RESOURCESAUTO / TRANSPORTATION
LIFE SCIENCESMANUFACTURING
MILITARY SMART CITIES
RETAIL
Smart Grid (multiple)
Wellhead optimization
Autonomous Mining
Perf-based Insurance
Personalized risk profiles
Retail banking
Clinical Trials
Patient Experience
Medical Equipment Tracking and Diagnostics
Remote Monitoring
Inventory Management
Supply Chain Management
Predictive Maintenance
Supply Chain Optimization
Equipment Tracking
Fleet Tracking
Automate Workflows
Personnel Safety
Connected battlefield
Supply chain
Smart lighting
Smart parking
Smart waste
Dealership of the future
Remote diagnostics
Fleet management
Autonomous vehicle
iBeacon and Proximity Based Consumer Marketing
Reimagined Brick and Mortar Store
Personalized Analytics
Intelligent Replenishment
Supply Chain Management
Memorable Experiences
11 | Copyright © 2019
IOT SMART STORE – DELIVERING AMAZING SHOPPING EXPERIENCES
Wayfinding using app
Shopping List Mapping with aisle numbers • User enters the shop, the app automatically detects his
location inside the store and populates path to products listed in the Shopper’s shopping list’
Shopping Carts with Tablets & Sensors
Displaying relevant ads and coupons based on gender• Monitors footfall and starts ads in loop• Facial recognition (male/female) and show relevant ads• Direct interaction with Smart phone using Bluetooth
technology and receive coupons immediately
Smart shelves with inbuilt small displays• Show detailed information/coupons about the product when
shopper picks a product from the shelf• If product is not replaced back by customer, send the info. to
backend retail app
Cart with in-built tablets, sensor and payment system • Alerting shoppers to promotions and suggestions as they
browse the aisles• Cart senses all the products in the product and calculates
total cost before existing the store.• User pays using the cart before leaving the store
• Location Sensor
• Wi-Fi network
• Retailer’s
shopping app
• Motivate users to populate their shopping list
and use retail apps.
• Enhance customer relation and provide great
experience
Smart Displays
Smart Shelves
• Sensor
• Bluetooth
• Intelligence
software
• Infra-red sensor
• Bluetooth
• Intelligence
software
• Location Sensor
• RFID
• Bluetooth
• Payment
software
• Targeted marketing and promote impulsive
buying .Insights on messaging effectiveness
• Introduce new products to targeted audience
• Display products ranges that can not be all
displayed on the shelf but are present in
warehouse
• Insights on messaging effectiveness, call to
action using real time shopper data
• Reduce time lag for shelf replenishment and
improves shelf space management
• Gain insights on product sales and use real time
data to improve inventory management
• Targeted marketing at POS and increase cross
selling
• Reduce payment stations, human effort and
decrease wait on queue time
• Improve inventory management by automating
data flow from sales to back-end applications
Sub U
se-c
ases
12 | Copyright © 2019
CUSTOMER JOURNEY – MEET JESSY
Jessy enters the retail store for shopping.
Retailer’s app sync the existing shopping list, wish list etc on Jessy’s mobile to Aisle location using location sensor data
Jessy picks up the Smart Cart and she goes to the Aisle The tablet on the cart shows her relevant information about the products on the Aisle using location sensors
Jessy is in the cooking section and picks up a spice. Tablet on cart displays few recipe that uses those spice. Jessy liked one and then the app shows all the ingredients needed for the recipe and where can she find them.
Jessy comes across Smart display. It has distance sensors and face recognition to identify it’s a female and shows relevant promotions on bags.
She is interested and she gets the coupons directly to her phone using Bluetooth technology.
The sensors on the cart have gathered the product cost info, the application on the tablet have received that info, calculated the total cost and shown the bill to Jessy.
Jessy has the Retailer app on her mobile. The iBeacon detects Jessy in the store.
As Jessy pick up her products from the Smart Shelf into her cart, the back end application for shelf replenishment management gets updated real time ,
Jessy pays the bill using smart payment option on the tablet.
Jessy leaves the store
13 | Copyright © 2019
SMART CITY | IOT USECASES
• A successful business architecture is enabled by innovation within and across domains
Cities meet the needs of a borderless workforce. Advances in technology help cities streamline government procedures, such as permitting and licensing.
Economy
Sensors detect leakage to preserve natural resources, such as water. Responsive devices (e.g., washing machines) temporarily stop consuming energy when demand for energy (and prices) increase.
Environment
Virtual learning, digitization, and augmented reality transform the way we learn.
Education
Cities promote connected communities through smart buildings, health care innovation, and the use of data to monitor and enhance social programs.
Living
Shared mobility, autonomous vehicles, dynamic pricing, IoT, and advanced analytics enable more people and goods to move faster, safer, cheaper, and cleaner.
Mobility
Drones, wearable computing, facial-recognition, and predictive video help law enforcement fight crime and protect public safety.
Security
14 | Copyright © 2019
Implications on cyber security
15 | Copyright © 2019
A Changing
Business and
Cyber Risk
Landscape
S T E AM
E L E C T R I C
D I G I TAL
H Y P E R - C O N N E C T E D
AN D I N T E L L I G E N T
Era of Maturity
and Ubiquity
Era of Risk
Era of Compliance
The fourth industrial revolution is upon
us, one of hyper-connectivity and
intelligence. Simultaneously, we are
entering an era of cyber maturity and
ubiquity. It’s imperative that we address
this shift.
16 | Copyright © 2019
THREE KEY FACTORS INFLUENCE CYBER RISK
Convergence
Convergence of IT and OT infrastructures, blurring
the lines between the physical and cyber worlds.
Interoperability
Coexistence and frequent interactions between old and new systems and
platforms.
Integration
Integration and comingling of services across
domains through IoT and digital technologies.
17 | Copyright © 2019
KEY SECURITY AND PRIVACY CHALLENGES
Exponential increase in data volumeThe vast amount of data generated by IoT devices will need to be secured where necessary: confidentiality, integrity and availability needs to be maintained to a level acceptable by the business
Data security needs to be considered for data at rest and in transit, for aggregated or distributed data and both within the traditional organisational boundaries and on dispersed devices
More nuanced Privacy considerationsThe massive amount of data can reveal trends by combining data points that by themselves are seemingly innocuous: power of aggregate data needs to be harnessed in a manner that takes into account both legal and ethical Privacy considerations
IoT can create potential conflicts for organisations about what data is public and what data is private, warranting a proactive deliberation on the subject
Exponential increase in attack surfaceAdopting IoT will not only introduce a vast
number of devices to an organisation’s network but also connect many organisations
together via a common “IoT fabric”
Each organisation needs to not only look at Cyber security risks as it applies to itself but
also consider its position in the “IoT information ecosystem” and understand how its security practices can affect others in the
hyper-connected IoT era
Resource-constrained IoT devicesSecurity features need to be implemented in
devices that are severely constrained in terms of computing resources and/or power, but still
achieve an acceptable level of security
18 | Copyright © 2019
An integrated risk management philosophy is not optional
19 | Copyright © 2019
Cyber risk management and innovation must be on equal footing
20 | Copyright © 2019
No global risk standards? No excuse.
21 | Copyright © 2019
Retrofitting can work – but introduces new risks
22 | Copyright © 2019
Loosely coupled systems can help now—in lieu of an overhaul
23 | Copyright © 2019
As the use of IoT technology continues to grow, so does the threat landscape for connected devices. Being resilient is having the ability to respond to a cyber crisis. As IoT solutions become more prevalent, a cyber threat, if improperly managed, can bring an organization to its knees, as we have seen in previous distributed denial of service (DDoS) attacks. Understanding potential impacts to the device network—and having response plans to quickly recover from a cyber event—is increasingly critical to mitigating risks and achieving the expected benefits of a connected device architecture.
Being vigilant around IoT requires having the people, processes, and technology components to identify network and physical vulnerabilities, identify known and unknown assets, and periodically test protection levels. Asset discovery tools and the inclusion of analytics, operations centers, and security information and event monitoring (SIEM) tools allow organizations to identify threats and take corrective action before issues develop into full scale cyber-attacks.
A comprehensive approach towards managing IOT Security
Secure IoT requires hardening the end-to-end solution. Organizations should include secure components—such as secure code scanning, vulnerability management, application security, and identity/access management into each tier of the IoT landscape.
SECURE
“Are we really protected?”
VIGILANT
“How do we know if we’ve been breached?”
RESILIENT
“Can we respond effectively to a cyber incident?”
24 | Copyright © 2019
Thank you.