iot security for an evolving 5g world - cyber florida · hitting the sweet spot hackers love new...
TRANSCRIPT
![Page 1: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/1.jpg)
IoT Security for an Evolving
5G World
![Page 2: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/2.jpg)
©2019
Joseph Cortese, Penetration Testing Practice Lead
• Accomplished cybersecurity leader with 12 years experience in defense, healthcare, and retail industries
• Certified Ethical Hacker of mobile, embedded, wireless, web-enabled devices
• Highly skilled in design, production, and execution of projects and deliverables
• Created capabilities using RaspberryPi & Arduino embedded boards, authored white-papers and training for clients and colleagues
![Page 3: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/3.jpg)
IoT Disruption and HacksNot a matter of IF, but WHEN.
![Page 4: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/4.jpg)
©2019
IoT Disruption and HacksIt’s not a matter of IF, but WHEN.
• Hackers don’t wait to find gaps in security• First to uncover vulnerabilities gets the “street cred”
• Vendors rush devices into market, many of them insecure• Open management ports, debug mode, test modes are still present
![Page 5: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/5.jpg)
IoT and TechnologyNew Usage Cases
![Page 6: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/6.jpg)
©2019
IoT and TechnologyNew Usage Cases
• Near real-time communications and low latency will give birth to new usage cases within IoT and Technology
• Solutions not previously used for IoT will be integrated• Communication will become more robust• IoT devices will communicate and exchange information• Many solutions proposed include smart buildings, auto industry, traffic control
![Page 7: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/7.jpg)
Devices are ChangingWhat’s Changing in IoT
![Page 8: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/8.jpg)
©2019
Devices are ChangingWhat’s Changing in IoT
• Newer devices that are not thought IoT may become “connected”• There are new risks, exploits and attack surfaces• Devices that interact with each other can traverse into hard to get networks• More capable devices may pose a risk to older IoT devices as legacy devices may have
vulnerabilities.• Privacy concerns with tracking, large footprint IoT networks.
![Page 9: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/9.jpg)
Hitting the Sweet SpotHackers Love New Devices
![Page 10: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/10.jpg)
©2019
Hitting the Sweet SpotHackers Love New Devices
• As new devices emerge, new exploits will surface• Hackers are constantly taking advantage of gaps in security
• Old exploits may return with new exploits• As old exploits resurface, attacks may happen faster• As IoT devices communicate together attacks become complex
![Page 11: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/11.jpg)
Vendors, You Must ActNew Layers of Protection and Security
![Page 12: IoT Security for an Evolving 5G World - Cyber Florida · Hitting the Sweet Spot Hackers Love New Devices • As new devices emerge, new exploits will surface • Hackers are constantly](https://reader034.vdocuments.net/reader034/viewer/2022042319/5f08190a7e708231d420531e/html5/thumbnails/12.jpg)
©2019
Vendors, You Must ActNew Layers of Protection and Security
• For new IoT devices, vendors must increase security on their network• Multiple layers of security must be used with new technology• Routine security reviews, sandboxing, penetration-testing• Continuous monitoring, possible tamper protection, file system integrity