Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational...

17
C O N F I D E N T I A L March 15 th 2018 ANALYSIS. ACTION. TRUST. 1 Presentation to Joint Legislative Emergency Management Oversight Committee, Raleigh, North Carolina. Connected Devices Cyber Security Strategy Uri Alter, Founder and Co-CEO, VDOO Connected Trust

Transcript of Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational...

Page 1: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

March 15th 2018

ANALYSIS. ACTION. TRUST.

1

Presentation to Joint Legislative Emergency Management Oversight Committee, Raleigh, North Carolina.

Connected Devices Cyber Security StrategyUri Alter, Founder and Co-CEO, VDOO Connected Trust

Page 2: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

About

Backed by VCs and strategic individual investors

Deep expertise across cybersecurity domains with with the right mix of

talent• Founders of Cyvera, acquired by Palo Alto Networks, CA in 2014

• Top security researchers from both defense and industry

In beta with major IoT makers

Contributing data, methodology and code to standardization bodies

and coders community

2

Page 3: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

4%

3

IoT Current Adoption and Excepted Growth Rate

* Organizational Adoption of Common IoT Use Case, by Gartner, CEB 2017 IoT security Survey

83% 13%

83% 11%7%

67% 22%11%

Physical Monitoring(e.g., Cameras, Motion Sensors)

Physical Access(e.g., Badge Readers, Biometrics)

HVAC(i.e., Heating, Cooling, AC)

Currently Use Plan to Adopt in 12-18 Months Do Not Use or Mo Plans to Adopt

Page 4: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

What When/Where Impact Environment

Persirai targeted more than 1,000 IP camera

models, totaling 120,000 IP camerasGlobally, May 2017

Emotional for users, reputational for vendor,

financial for businesses, DDoS on othersBusiness / Home

Teledidonics collected sensitive user

information from IoT adult toys U.S., Mar 2017

Emotional for users, reputational for vendor,

Privacy infringement lawsuit settledHome

Hajime Turned 300,000 IoT devices to bots.

Possibly a White Hat. It’s built on a P2P network

Emotional for users, reputational for vendor,

financial for businesses, Possibly a Whit HatGlobally, April 2017 Home

CloudPets exposed 2.2 million voice recordings

and account info of 800000 kidsGlobally, Feb 2017

Emotional for users, reputational for vendor, barrier

for IoT growth from adoption perspectiveHome

Romantik Seehotel Jaegerwirt hotel guests

rooms’ doors lockage until payAustria, Jan 2017

Emotional on customers, reputational for business,

IoT growth barrier (back to traditional locks)Business

Amazon Key vulnerable to spoof attack

keeping camera offline without user knowledge

Emotional on customers, reputational for business,

can lead to burglaryU.S., Nov 2017 Business / Home

Foscam baby camera has been hacked and

used to scare terrified babyU.S., Nov 2016 Home

Emotional, vendor reputation damaged due to

buzz in parents’ blogs

Samsung SmartThing Severe vulnerability

(enables to open locks, turn on fire alarm, etc)

Reputational for vendor, barrier for IoT growth

from adoption perspectiveHomeGlobally, May 2016

Vtech devices breached, exposing data of 6.4

million childrenGlobally, Dec 2015

Emotional for users, reputational for vendor, barrier

for IoT growth from adoption perspectiveHome

Reaper uses known security flaws in the code.

Infected one million networks used for DDoSEmotional for users, reputational for vendorU.S., Oct 2017 Home

Mirai utilizes millions of IoT devices to execute

DDoS on Dyn and other web servicesGlobally, Aug 2016 - Mar 2017

Emotional for users, reputational for vendor,

Privacy infringement lawsuit settledHome

Breadth of IoT Cyber Attacks

4

Page 5: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

IoT security inherent tension

Time to market

IoT Makers’ Focus Insufficient Solutions

Internal security team

Cyber-Crime Business

Model (ROI)

Cost per single attack

Cost 3rd party pen-testingReplication opportunities

Functionality Attack impactRegulators & industry best

practice

5

Page 6: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

IoT Hacking Scenarios | Predicted Tomorrow (12-24 m)

Schools & Universities Hospitals Businesses

6

Page 7: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

Threat Landscape

Privacy Violation

Intelligence Gathering Toward A Physical Attack

Combined Physical and Cyber Attack On A Single Target

Multiple-Target Attack

7

Page 8: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

The K-12 Cyber Incident Map312 Incidents Since January 2016

8

Page 9: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

9

Page 10: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

10

Page 11: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

11

Page 12: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

12

Page 13: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

13

Page 14: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

14

Page 15: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

Click to see live feed98.101.108.195

15

Page 16: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

Security Authority (SA) for Connected Device CertificationDevice Focused, Automated, Scalable, Balanced, Solution.

VDOO’s mission:

• Help IoT Regulators build their right IoT security strategy and standards,

and enforce them through existing technologies

• Help IoT makers own security at the development stage, and enable

post-deployment security

• Provide IoT operators visibility and security of their existing devices and

tool to support responsible and informed buying decisions

16

Page 17: Connected Devices Cyber Security Strategy · Globally, Dec 2015 Emotional for users, reputational for vendor, barrier for IoT growth from adoption perspective Home Reaper uses known

C O N F I D E N T I A L

ANALYSIS. ACTION. TRUST.

17

[email protected]

Thank you.