A smarter,
more secure
Internet of Things
Travis Greene
Identity Solutions Strategist, NetIQ
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.2
Internet of Things
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.3
Internet of Things
What “things” and how did we get there?
Goldman Sachs, What is the Internet of Things?, September 2014
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.4
Two Critical Components
Things People behind
the “Things”
The Internet of Things
- A Few Examples
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.6
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.7
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.8
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.9
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.10
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.11
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.12
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.13
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.14
The Risk Presented by
the Internet of Things
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.16
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.17
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.18
• The Internet of Things
will change the way we
use and interact with
technology.
• Devices will constantly
monitor and respond
both to us and to
each other.
• We must learn to
manage this interaction.
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.19
“Another evolving area of risk lies in
physical objects—industrial components,
automobiles, home automation products,
and consumer devices, to name a few—that
are being integrated into the information
network, a trend typically referred to as the
‘Internet of Things.’
The interconnection of billions of devices
with IT and operational systems will
introduce a new world of security risks for
businesses, consumers, and governments.”
2014 PwC State of Cybercrime Survey
“The development towards an IoT is likely to
give rise to a number of ethical issues and
debates in society, many of which have
already surfaced in connection with the
current Internet and ICT in general, such as
loss of trust, violations of privacy, misuse of
data, ambiguity of copyright, digital divide,
identity theft, problems of control and of
access to information and freedom of
speech and expression. However, in IoT,
many of these problems gain a new
dimension in light of the increased
complexity.”
2013 European Commission Report on the IoT
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.22
Gartner Hype Cycle
So, how do we do that?
Focus on the identities
Too many users with
too much access
Too many users with
too much access
devices
We can’t leave it to the
manufacturers’ plan
We can’t stop attacks,
but we can mitigate the
damage
Focus on the basics
Enforce
access
controls
Monitor
user
activity
Minimize
rights
But how do we understand if
the activity is appropriate?
31
The answer is
NOT more data
• Security teams already have too
much data to deal with
• New tools and new
infrastructures compound the
problem
Simply put…
There’s too much noise and
not enough insight
Security needs context…
What
access?
Access
okay?
Normal?
Where?
Who?
Identity?
35
What is the key?
Identity
We must adopt identity-centric
thinking if we want to have any
chance of maintaining control
over the world we are building
Identity of Everything
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.38
The Identity of Everything allows the
creation of a unique set of attributes
• Who or what every connected item or person is
• What permissions those objects and people have
• What they do with those entitlements
• Who granted the permissions
• How other people and devices may interact
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.39
• Google Nest, a home
automation hub
• Collects data from other
appliances & sensors
• But there is a homeowner
identity behind it that Google
wants to market to
• And that owner will have
relationships to many other
things
The Identity of Everything will be both
Hierarchical and Matrixed
© 2014 NetIQ Corporation. All rights reserved.40
NetIQ provides a unique combination of
Identity, Access and Security solutions
that will scale to address the future
demands on identity
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.41
Actions for Today, Tomorrow, Next Year
• Understand the identity stores you already have
• Examine how identity information is used in your
organization
• Look for ways to integrate identity context into your
product design to protect data collected by IoT sensors
• Start to build a framework to handle more
sophisticated, aggregate identity, that can scale
• Work towards an extensible identity framework that
will encompass people, products, devices and services
+1 713.548.1700 (Worldwide)
888.323.6768 (Toll-free)
info@netiq.com
NetIQ.com
Worldwide Headquarters
515 Post Oak Blvd.,
Suite 1200
Houston, TX 77027 USA
www.netiq.com/communities
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.
Copyright © 2015 NetIQ Corporation. All rights reserved.
ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.

More Related Content

PPTX
From reactive to automated reducing costs through mature security processes i...
PPTX
Leveraging Identity to Manage Change and Complexity
PDF
Cloud Identity
PPTX
Building A Cloud-Ready Security Program
PPTX
Scrubbing Your Active Directory Squeaky Clean
PDF
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
PDF
Security - A Digital Transformation Enabler
PPTX
SANS Critical Security Controls Summit London 2013
From reactive to automated reducing costs through mature security processes i...
Leveraging Identity to Manage Change and Complexity
Cloud Identity
Building A Cloud-Ready Security Program
Scrubbing Your Active Directory Squeaky Clean
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
Security - A Digital Transformation Enabler
SANS Critical Security Controls Summit London 2013

What's hot (20)

PDF
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PDF
The Future of Technology Operations
PDF
Why Executives Underinvest In Cybersecurity
PDF
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
PDF
Total Digital Security Introduction 4.2
PDF
2021 English Part One Anti-phishing Webinar Presentation Slides
PPTX
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
PPTX
Are You Being Anti-Social
PDF
G05.2013 gartner top security trends
PDF
Identiverse Zero Trust Customer Briefing, Identiverse 2019
PPTX
New CISO - The First 90 Days
PPTX
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
PPTX
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
PDF
IT Service & Asset Management Better Together
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PDF
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
PDF
Energy Industry Organizational Strategies to Increase Cyber Resiliency
PPT
How Network Data Loss Prevention is Implemented
PPTX
Mobility Security - A Business-Centric Approach
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
The Future of Technology Operations
Why Executives Underinvest In Cybersecurity
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Total Digital Security Introduction 4.2
2021 English Part One Anti-phishing Webinar Presentation Slides
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Are You Being Anti-Social
G05.2013 gartner top security trends
Identiverse Zero Trust Customer Briefing, Identiverse 2019
New CISO - The First 90 Days
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
IT Service & Asset Management Better Together
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
Energy Industry Organizational Strategies to Increase Cyber Resiliency
How Network Data Loss Prevention is Implemented
Mobility Security - A Business-Centric Approach
Ad

Viewers also liked (17)

PPTX
BrainShare 2014
PDF
Mobile Apps in Your Business
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PPTX
Bring Your Own Identity
PDF
Modern Web Developement
PPT
Identity, Security and Healthcare
PPTX
Flaws in Identity Management and How to Avoid Them
PPTX
5 insider tips for using it audits to maximize security
PDF
Internet of Things Facts and Stats
PDF
Internet of Things forecasts infographic
PDF
IT Disaster Recovery
PDF
The Next Indispensable Tool for Small Business
PDF
2014 Cyberthreat Defense Report
PDF
Regulating the dark net
PDF
Making Good: Diversity and Equality in the Maker Movement
PDF
6 Essentials For Parents Of College Students
PDF
21 Most Common Film Genres
BrainShare 2014
Mobile Apps in Your Business
Advanced Persistent Threat - Evaluating Effective Responses
Bring Your Own Identity
Modern Web Developement
Identity, Security and Healthcare
Flaws in Identity Management and How to Avoid Them
5 insider tips for using it audits to maximize security
Internet of Things Facts and Stats
Internet of Things forecasts infographic
IT Disaster Recovery
The Next Indispensable Tool for Small Business
2014 Cyberthreat Defense Report
Regulating the dark net
Making Good: Diversity and Equality in the Maker Movement
6 Essentials For Parents Of College Students
21 Most Common Film Genres
Ad

Similar to A Smarter, More Secure Internet of Things (20)

PPTX
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
PPTX
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
PDF
The Identity of Things: Privacy & Security Concerns
PDF
The internet of things..perspectives for the Nigerian legal system
PPTX
Iot privacy vs convenience
PDF
Io t whitepaper_5_15_17
PDF
Simon Harrison RWE - Chain of Things 010616 final
PPTX
Internet & iot security
PPTX
National seminar on emergence of internet of things (io t) trends and challe...
PPTX
Internet of Things TCLG Oct 23 2014
PDF
Exploring Secure Computing for the Internet of Things, Internet of Everything...
PPTX
Internet of Things
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PDF
Developing surveillance challenges in theinternet of things
PPTX
Introduction to IOT security
PDF
IBM Xforce Q4 2014
DOCX
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
PDF
All you need to know about SSI for Corporates and IoT – Heather Vescent
PDF
Telefónica security io_t_final
PDF
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
The Identity of Things: Privacy & Security Concerns
The internet of things..perspectives for the Nigerian legal system
Iot privacy vs convenience
Io t whitepaper_5_15_17
Simon Harrison RWE - Chain of Things 010616 final
Internet & iot security
National seminar on emergence of internet of things (io t) trends and challe...
Internet of Things TCLG Oct 23 2014
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Developing surveillance challenges in theinternet of things
Introduction to IOT security
IBM Xforce Q4 2014
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
All you need to know about SSI for Corporates and IoT – Heather Vescent
Telefónica security io_t_final
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...

More from NetIQ (19)

PDF
Open Enterprise Server With Windows
PDF
Big Payoffs With BYOD and Mobility
PDF
Paraca Inc.
PDF
The University of Westminster Saves Time and Money with Identity Manager
PDF
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
PDF
Swisscard Saves Time and Effort in Managing User Access
PDF
Vodacom Tightens Security with Identity Manager from NetIQ
PDF
University of Dayton Ensures Compliance with Sentinel Log Manager
PDF
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
PDF
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
PDF
Netiq css huntington_bank
PDF
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
PDF
NetIQ Identity Manager Unites Hanshan Normal University
PDF
Handelsbanken Takes Control of Identity Management with NetIQ
PDF
Millions of People Depend on Datang Xianyi Technology and NetIQ
PDF
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
PDF
Central Denmark Region Strengthens Administrative Security with Identity Mana...
PDF
Identity-Powered Security
PDF
Owens Community College adds Single Sign-On and Meets FERPA
Open Enterprise Server With Windows
Big Payoffs With BYOD and Mobility
Paraca Inc.
The University of Westminster Saves Time and Money with Identity Manager
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
Swisscard Saves Time and Effort in Managing User Access
Vodacom Tightens Security with Identity Manager from NetIQ
University of Dayton Ensures Compliance with Sentinel Log Manager
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Netiq css huntington_bank
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ Identity Manager Unites Hanshan Normal University
Handelsbanken Takes Control of Identity Management with NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Identity-Powered Security
Owens Community College adds Single Sign-On and Meets FERPA

Recently uploaded (20)

PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
Networking2-LECTURE2 this is our lessons
PPTX
Concepts of Object Oriented Programming.
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Artificial_Intelligence_Basics use in our daily life
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PPTX
Reading as a good Form of Recreation
PPTX
Introduction to networking local area networking
PDF
Public for study about wiring to confirm.
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PPTX
Basic_of_Computer_System.pptx class-8 com
PPTX
Introduction: Living in the IT ERA.pptx
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
Basic understanding of cloud computing one need
PPTX
Edit gdasgdkhagfhgfgfasdghhdgfhdgfj.pptx
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Networking2-LECTURE2 this is our lessons
Concepts of Object Oriented Programming.
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Artificial_Intelligence_Basics use in our daily life
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Reading as a good Form of Recreation
Introduction to networking local area networking
Public for study about wiring to confirm.
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
Basic_of_Computer_System.pptx class-8 com
Introduction: Living in the IT ERA.pptx
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Containerization lab dddddddddddddddmanual.pdf
Basic understanding of cloud computing one need
Edit gdasgdkhagfhgfgfasdghhdgfhdgfj.pptx
Viva Digitally Software-Defined Wide Area Network.pptx

A Smarter, More Secure Internet of Things

  • 1. A smarter, more secure Internet of Things Travis Greene Identity Solutions Strategist, NetIQ
  • 2. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.2 Internet of Things
  • 3. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.3 Internet of Things What “things” and how did we get there? Goldman Sachs, What is the Internet of Things?, September 2014
  • 4. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.4 Two Critical Components Things People behind the “Things”
  • 5. The Internet of Things - A Few Examples
  • 6. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.6
  • 7. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.7
  • 8. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.8
  • 9. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.9
  • 10. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.10
  • 11. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.11
  • 12. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.12
  • 13. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.13
  • 14. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.14
  • 15. The Risk Presented by the Internet of Things
  • 16. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.16
  • 17. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.17
  • 18. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.18 • The Internet of Things will change the way we use and interact with technology. • Devices will constantly monitor and respond both to us and to each other. • We must learn to manage this interaction.
  • 19. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.19
  • 20. “Another evolving area of risk lies in physical objects—industrial components, automobiles, home automation products, and consumer devices, to name a few—that are being integrated into the information network, a trend typically referred to as the ‘Internet of Things.’ The interconnection of billions of devices with IT and operational systems will introduce a new world of security risks for businesses, consumers, and governments.” 2014 PwC State of Cybercrime Survey
  • 21. “The development towards an IoT is likely to give rise to a number of ethical issues and debates in society, many of which have already surfaced in connection with the current Internet and ICT in general, such as loss of trust, violations of privacy, misuse of data, ambiguity of copyright, digital divide, identity theft, problems of control and of access to information and freedom of speech and expression. However, in IoT, many of these problems gain a new dimension in light of the increased complexity.” 2013 European Commission Report on the IoT
  • 22. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.22 Gartner Hype Cycle
  • 23. So, how do we do that?
  • 24. Focus on the identities
  • 25. Too many users with too much access
  • 26. Too many users with too much access devices
  • 27. We can’t leave it to the manufacturers’ plan
  • 28. We can’t stop attacks, but we can mitigate the damage
  • 29. Focus on the basics Enforce access controls Monitor user activity Minimize rights
  • 30. But how do we understand if the activity is appropriate?
  • 31. 31 The answer is NOT more data • Security teams already have too much data to deal with • New tools and new infrastructures compound the problem
  • 32. Simply put… There’s too much noise and not enough insight
  • 34. 35 What is the key? Identity
  • 35. We must adopt identity-centric thinking if we want to have any chance of maintaining control over the world we are building
  • 37. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.38 The Identity of Everything allows the creation of a unique set of attributes • Who or what every connected item or person is • What permissions those objects and people have • What they do with those entitlements • Who granted the permissions • How other people and devices may interact
  • 38. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.39 • Google Nest, a home automation hub • Collects data from other appliances & sensors • But there is a homeowner identity behind it that Google wants to market to • And that owner will have relationships to many other things The Identity of Everything will be both Hierarchical and Matrixed
  • 39. © 2014 NetIQ Corporation. All rights reserved.40 NetIQ provides a unique combination of Identity, Access and Security solutions that will scale to address the future demands on identity
  • 40. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.41 Actions for Today, Tomorrow, Next Year • Understand the identity stores you already have • Examine how identity information is used in your organization • Look for ways to integrate identity context into your product design to protect data collected by IoT sensors • Start to build a framework to handle more sophisticated, aggregate identity, that can scale • Work towards an extensible identity framework that will encompass people, products, devices and services
  • 41. +1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) [email protected] NetIQ.com Worldwide Headquarters 515 Post Oak Blvd., Suite 1200 Houston, TX 77027 USA www.netiq.com/communities
  • 42. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2015 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.