Upload
centracomm
View
119
Download
3
Embed Size (px)
Citation preview
Business Security in a Connected Society aka Internet of Things (IoT), Networked Society
EducationAA – Tiffin UniversityBA – Ohio Northern UniversityMA – Bowling Green State UniversityMA – George Washington University
ExperiencePrincipal Founder, President & Chairman - CentraCommCEO - Aardvark Inc.
Lynn R. Child
SecurityinaConnectedSociety
Evolution of Society’s Use of Technology
SmarterDevices=ConnectedSociety
Technology is making our homes safer
Technology is making work smarter
Technology is changing society
Technology is connecting the world
Connectivity will overhaul businesses
Data will power business decisions: The emerging world of Big Data Analytics is revolutionizing business decision-making
Rank Country Devicesonline Relative size
1 SouthKorea 37.9
2 Denmark 32.7
3 Switzerland 29.0
4 UnitedStates 24.9
5 Netherlands 24.7
6 Germany 22.4
7 Sweden 21.9
8 Spain 19.9
9 France 17.6
10 Portugal 16.2
11 Belgium 15.6
12 UnitedKingdom 13.0
13 Canada 11.6
14 Italy 10.2
15 Brazil 9.2
16 Japan 8.2
17 Australia 7.9
18 Mexico 6.8
19 Poland 6.3
20 China 6.2
21 Colombia 6.1
22 Russia 4.9
23 Turkey 2.3
24 India 0.6
Connected Society:
*Organisation_for_Economic_Co-operation_and_Development
Over75BillionConnected
Devicesby2020!
List of countries by IoT devices online per 100 inhabitants as published by the OECD* in 2015.
HackersDisruptBusiness
1963MIT coins the term “Hackers” related to people who were typing up the phone lines.
1983The movie War Games is released and depicts a young hacker nearly starting WWIII by accessing a military supercomputer.
1995The web takes off and famous hacker Kevin Mitnick steals 20,000 credit card numbers leading to a fear of e-commerce. Later caught by the FBI by utilizing a “White Hacker”.
2006Julian Assange becomes the new face of hacking.
2011CIA, PBS, Gmail, the U.S. Senate all are hacked. Anonymous rises up as a underground hacktivist community. Year was coined “The Year of the Hack.”
2014A record 1 billion records were compromised. Becomes the new “Year of the Breach.”
RiskstoHome,Business,&Careers
Security hacks could expose our homes
Security hacks could disrupt our businesses
Security hacks could end you & your students careers
WhatCanBusinessDeans&FacultyDo?
Be Aware of the Most Prevalent Tactics to “Hack” Information
Spearfishing:Ane-mailspoofingfraudattemptthattargetsaspecificorganization,seekingunauthorizedaccesstoconfidentialdata. …conductedbyperpetratorsoutforfinancialgain,tradesecretsormilitaryinformation.ExampleofSocialEngineering.
Be Aware of Other Prevalent Forms of Hacks: MalwareMalicioussoftwarethatinterfereswithnormalcomputerfunctionsorsendspersonaldataabouttheusertounauthorizedpartiesovertheInternetorgainsaccesstoprivatecomputersystems.Includesviruses,worms,Trojanhorses,etc.Somecommonandprevalentmalwareincludes:
•SpyWare – secretlygathersinformationaboutapersonororganization.Cantakepartialorfullcontrolofcomputerwithoutknowledgeofuser.•AdWare – automaticallyrendersadvertisementsinordertogeneraterevenueforitsauthor.Pop-upsareanexample.•RamsonWare – restrictsaccesstoyourcomputersystemanddemandsaransombepaidtothecreatorofthemalwareinorderfortherestrictiontoberemoved.Formsinclude:encryptedfiles,locksystem/displaymessagetopay…
.
6 Online Security Tips for Your Students & You
üThinkBeforeYouClicküGotoAuthorizedMarketplaceforDownloadsüUpdate/PatchSoftwareUponyourDevicesüPracticePasswordManagementüCreateSeparateEmailAccountsüConsiderEnd-UserSecurityTrainingüIfItFeelsWrong,ItProbablyIs!
A Challenge to Deans, Faculty, and StaffPrepare your Business Students for the Reality of a Connected Society: - Read and Research Continuously - Utilize Case Studies- Practice Simulations- Seek Out Industry Speakers- Attend Relevant Events and Webinars- Be Willing to Watch, Learn, & Listen from
Your Students!
• Student&FacultyPresentations• DefiningtheInternetofThings• TheCONfidence ofThings• IoT andBusiness• ManufacturingandConnectedDevices• Automotive,Security&Trust• ThePowerofDataAnalytics• StudentCompany&Internship
Interaction• InteractiveQ&AThroughouttheDay
2015IAForum Agenda
RegisterTodaywww.IAForum.net
$35ChamberMembers|$45Non-ChamberMembers|$10Students
BreakfastandLunchProvidedWednesdayOctober28th 8:45am– 5:00pm
Winebrenner Auditorium,Winebrenner SeminaryTheUniversityofFindlayCampus
950NorthMainStreet,Findlay,OH45840
Presentation References & Other Resourcesü ConnectedSociety/InternetofThings:
https://en.wikipedia.org/wiki/Internet_of_Thingsü TheHorizonReport-2015HigherEducation(EmergingTechnologies):
http://www.ictliteracy.info/rf.pdf/Horizon-report-2015.pdfü Over75BillionDevicesConnectedby2020:
http://www.businessinsider.com/75-billion-devices-will-be-connected-to-the-internet-by-2020-2013-10
ü World’sBiggestDataBreaches:http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks//
ü JeepCarGetsHacked:http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway
ü Spearfishing:http://searchsecurity.techtarget.com/definition/spear-phishingü MalWare:http://whatis.techtarget.com/glossary/Malware
Presentation References & Other Resources
ü GrrCon SecuritySummit&HackerConference:http://grrcon.comü IAForum.net:http://IAForum.netü WhytheInternetofThingsisBigBusiness:
http://harvardmagazine.com/2015/07/why-the-internet-of-things-is-big-business
ü NISTCybersecurityFramework: http://www.nist.gov/cyberframework/ü OnlineTrustAlliance:https://otalliance.org/initiatives/internet-thingsü End-UserSecurityTraining: http://www.KnowBe4.comü SocietalImpactofaConnectedLifeOvertheNext5Years:
http://www.gsma.com/connectedliving/wp-content/uploads/2013/02/GSMA-Connected-Life-PwC_Feb-2013.pdf
ü TopITTrendsin2015:http://www.entrepreneur.com.ph/technology/top-it-trends-for-businesses-in-2015-and-how-to-prepare-for-those?ref=tag
ThankyoufortheHonor&PrivilegeofSharingInformationRegarding
“BusinessSecurityinaConnectedSociety.”
LynnR.Child,President&Chairman,CentraCommwww.CentraComm.netDirect:419-421-1284|[email protected]
Findthispresentationat:http://www.slideshare.net/CentraComm/security-in-a-connected-society