security in a connected society

33
Business Security in a Connected Society aka Internet of Things (IoT), Networked Society

Upload: centracomm

Post on 14-Apr-2017

117 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Security In A Connected Society

Business Security in a Connected Society aka Internet of Things (IoT), Networked Society

Page 2: Security In A Connected Society

EducationAA – Tiffin UniversityBA – Ohio Northern UniversityMA – Bowling Green State UniversityMA – George Washington University

ExperiencePrincipal Founder, President & Chairman - CentraCommCEO - Aardvark Inc.

Lynn R. Child

Page 3: Security In A Connected Society

SecurityinaConnectedSociety

Page 4: Security In A Connected Society

Evolution of Society’s Use of Technology

Page 5: Security In A Connected Society

SmarterDevices=ConnectedSociety

Page 6: Security In A Connected Society

Technology is making our homes safer

Page 7: Security In A Connected Society

Technology is making work smarter

Page 8: Security In A Connected Society

Technology is changing society

Page 9: Security In A Connected Society

Technology is connecting the world

Page 10: Security In A Connected Society

Connectivity will overhaul businesses

Page 11: Security In A Connected Society

Data will power business decisions: The emerging world of Big Data Analytics is revolutionizing business decision-making

Page 12: Security In A Connected Society

Rank Country Devicesonline Relative size

1 SouthKorea 37.9

2 Denmark 32.7

3 Switzerland 29.0

4 UnitedStates 24.9

5 Netherlands 24.7

6 Germany 22.4

7 Sweden 21.9

8 Spain 19.9

9 France 17.6

10 Portugal 16.2

11 Belgium 15.6

12 UnitedKingdom 13.0

13 Canada 11.6

14 Italy 10.2

15 Brazil 9.2

16 Japan 8.2

17 Australia 7.9

18 Mexico 6.8

19 Poland 6.3

20 China 6.2

21 Colombia 6.1

22 Russia 4.9

23 Turkey 2.3

24 India 0.6

Connected Society:

*Organisation_for_Economic_Co-operation_and_Development

Over75BillionConnected

Devicesby2020!

List of countries by IoT devices online per 100 inhabitants as published by the OECD* in 2015.

Page 13: Security In A Connected Society
Page 14: Security In A Connected Society

HackersDisruptBusiness

Page 15: Security In A Connected Society

1963MIT coins the term “Hackers” related to people who were typing up the phone lines.

1983The movie War Games is released and depicts a young hacker nearly starting WWIII by accessing a military supercomputer.

Page 16: Security In A Connected Society

1995The web takes off and famous hacker Kevin Mitnick steals 20,000 credit card numbers leading to a fear of e-commerce. Later caught by the FBI by utilizing a “White Hacker”.

2006Julian Assange becomes the new face of hacking.

Page 17: Security In A Connected Society

2011CIA, PBS, Gmail, the U.S. Senate all are hacked. Anonymous rises up as a underground hacktivist community. Year was coined “The Year of the Hack.”

2014A record 1 billion records were compromised. Becomes the new “Year of the Breach.”

Page 18: Security In A Connected Society

RiskstoHome,Business,&Careers

Page 19: Security In A Connected Society

Security hacks could expose our homes

Page 20: Security In A Connected Society

Security hacks could disrupt our businesses

Page 21: Security In A Connected Society

Security hacks could end you & your students careers

Page 22: Security In A Connected Society

WhatCanBusinessDeans&FacultyDo?

Page 23: Security In A Connected Society

Be Aware of the Most Prevalent Tactics to “Hack” Information

Spearfishing:Ane-mailspoofingfraudattemptthattargetsaspecificorganization,seekingunauthorizedaccesstoconfidentialdata. …conductedbyperpetratorsoutforfinancialgain,tradesecretsormilitaryinformation.ExampleofSocialEngineering.

Page 24: Security In A Connected Society

Be Aware of Other Prevalent Forms of Hacks: MalwareMalicioussoftwarethatinterfereswithnormalcomputerfunctionsorsendspersonaldataabouttheusertounauthorizedpartiesovertheInternetorgainsaccesstoprivatecomputersystems.Includesviruses,worms,Trojanhorses,etc.Somecommonandprevalentmalwareincludes:

•SpyWare – secretlygathersinformationaboutapersonororganization.Cantakepartialorfullcontrolofcomputerwithoutknowledgeofuser.•AdWare – automaticallyrendersadvertisementsinordertogeneraterevenueforitsauthor.Pop-upsareanexample.•RamsonWare – restrictsaccesstoyourcomputersystemanddemandsaransombepaidtothecreatorofthemalwareinorderfortherestrictiontoberemoved.Formsinclude:encryptedfiles,locksystem/displaymessagetopay…

Page 25: Security In A Connected Society

.

Page 26: Security In A Connected Society

6 Online Security Tips for Your Students & You

üThinkBeforeYouClicküGotoAuthorizedMarketplaceforDownloadsüUpdate/PatchSoftwareUponyourDevicesüPracticePasswordManagementüCreateSeparateEmailAccountsüConsiderEnd-UserSecurityTrainingüIfItFeelsWrong,ItProbablyIs!

Page 27: Security In A Connected Society

A Challenge to Deans, Faculty, and StaffPrepare your Business Students for the Reality of a Connected Society: - Read and Research Continuously - Utilize Case Studies- Practice Simulations- Seek Out Industry Speakers- Attend Relevant Events and Webinars- Be Willing to Watch, Learn, & Listen from

Your Students!

Page 28: Security In A Connected Society
Page 29: Security In A Connected Society

• Student&FacultyPresentations• DefiningtheInternetofThings• TheCONfidence ofThings• IoT andBusiness• ManufacturingandConnectedDevices• Automotive,Security&Trust• ThePowerofDataAnalytics• StudentCompany&Internship

Interaction• InteractiveQ&AThroughouttheDay

2015IAForum Agenda

Page 30: Security In A Connected Society

RegisterTodaywww.IAForum.net

$35ChamberMembers|$45Non-ChamberMembers|$10Students

BreakfastandLunchProvidedWednesdayOctober28th 8:45am– 5:00pm

Winebrenner Auditorium,Winebrenner SeminaryTheUniversityofFindlayCampus

950NorthMainStreet,Findlay,OH45840

Page 31: Security In A Connected Society

Presentation References & Other Resourcesü ConnectedSociety/InternetofThings:

https://en.wikipedia.org/wiki/Internet_of_Thingsü TheHorizonReport-2015HigherEducation(EmergingTechnologies):

http://www.ictliteracy.info/rf.pdf/Horizon-report-2015.pdfü Over75BillionDevicesConnectedby2020:

http://www.businessinsider.com/75-billion-devices-will-be-connected-to-the-internet-by-2020-2013-10

ü World’sBiggestDataBreaches:http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks//

ü JeepCarGetsHacked:http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway

ü Spearfishing:http://searchsecurity.techtarget.com/definition/spear-phishingü MalWare:http://whatis.techtarget.com/glossary/Malware

Page 32: Security In A Connected Society

Presentation References & Other Resources

ü GrrCon SecuritySummit&HackerConference:http://grrcon.comü IAForum.net:http://IAForum.netü WhytheInternetofThingsisBigBusiness:

http://harvardmagazine.com/2015/07/why-the-internet-of-things-is-big-business

ü NISTCybersecurityFramework: http://www.nist.gov/cyberframework/ü OnlineTrustAlliance:https://otalliance.org/initiatives/internet-thingsü End-UserSecurityTraining: http://www.KnowBe4.comü SocietalImpactofaConnectedLifeOvertheNext5Years:

http://www.gsma.com/connectedliving/wp-content/uploads/2013/02/GSMA-Connected-Life-PwC_Feb-2013.pdf

ü TopITTrendsin2015:http://www.entrepreneur.com.ph/technology/top-it-trends-for-businesses-in-2015-and-how-to-prepare-for-those?ref=tag

Page 33: Security In A Connected Society

ThankyoufortheHonor&PrivilegeofSharingInformationRegarding

“BusinessSecurityinaConnectedSociety.”

LynnR.Child,President&Chairman,CentraCommwww.CentraComm.netDirect:419-421-1284|[email protected]

Findthispresentationat:http://www.slideshare.net/CentraComm/security-in-a-connected-society