Hi [[ session.user.profile.firstName ]]

Internet of Things in the Enterprise: The data behind the risks

Many have hypothesized about the security impact of the “Internet of Things” (IoT) for enterprises, but for the first time, we have actual data on the potential security risks introduced by these devices—and the results may surprise you!
Andrew Hay, Director of Security Research at OpenDNS, conducted a multi-month study on the prevalence of IoT devices in enterprise networks. In this webcast, Andrew will walk through the key findings, including:
The prevalence of IoT devices—even in the most regulated industries—and which devices are most commonly found
Where IoT hosting infrastructure is located on the internet
Vulnerabilities found in IoT hosting infrastructure
Implications to consider for your security program
How to gain IoT visibility in your enterprise network
- See more at: https://www.opendns.com/enterprise-security/resources/webcasts/internet-of-things-in-the-enterprise-the-data-behind-the-risks/#sthash.INikZJu0.dpuf
Recorded Sep 29 2015 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Andrew Hay, Director of Security Research, OpenDNS & Meg Diaz, Product Marketing Manager, OpenDNS
Presentation preview: Internet of Things in the Enterprise: The data behind the risks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Connectivity: The Key to Powering IoT Healthcare Innovation Dec 31 2017 6:00 pm UTC 60 mins
    Tom Rose, Director of Business Development, IoT Solutions, KORE
    Without connectivity, healthcare innovation powered by IoT is more idea than actuality. Drivers of healthcare innovation include increased public health expenditures, growing aging population and the prevalence of chronic disease, and the challenges of lack of funding and patient retention. Healthcare innovation can address these challenges with IoT such as the instrumentation of things, the instrumentation of places, patient monitoring and remote healthcare delivery.

    In this webinar, experts in the field of healthcare IoT will discuss:

    * The benefits of IoT in healthcare
    * Example use cases demonstrating this innovation
    * How to implement connected solutions to power innovation
    * How data flows between devices, to the cloud, and to enterprise systems can be achieved
    * How Kore powers mHealth Solutions

    Sign up for this 60-minute webinar today and gain valuable insights into building an effective IoT strategy within healthcare

    Tom Rose, Director of Business Development, IoT Solutions, KORE
    Marie Finnegan, Principal Portfolio Marketing Specialist, Allscripts

    Rachael Brownell, Webinar Manager, ReadWrite

    Brought to you by; KORE and ReadWrite
  • 2017 Trends in IoT Cyber Attacks Sep 13 2017 4:15 pm UTC 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    There is a need to protect your Internet of Things (IoT) devices from unknown vulnerabilities. The Gartner IoT Market guide provides insightful recommendations security professionals should take when considering an IoT security vendor. This session will discuss the key findings.
    Viewers will learn:
    • Current trends in Cyber attacks for IoT
    • Security Metrics for IoT
    • Oversight of third parties in IoT
    • How to measure cybersecurity preparedness for IoT
    • Automated approaches to integrate Security into IoT
  • The Data Cities Collect and Your Transportation Future Jun 23 2017 9:00 pm UTC 45 mins
    Laura Schewel, CEO, StreetLight Data
    From automated vehicles to ride hailing apps, transportation as we know it is changing - and fast. But new technologies alone won't help communities build the efficient, equitable, and sustainable transportation networks communities want. In fact, these innovative technologies could do just the opposite, especially if they are not deployed wisely. Cities must collect the right data and enact the right policies to ensure they do not exacerbate problems like inequity and traffic, and to hold themselves accountable to the promise of new mobility technologies.

    In this webinar, you will find out why - and how - the smartest cities of tomorrow will be those that adopt data-driven transportation strategies today. Join for Laura Schewel's presentation to gain insights into:

    • Why the status quo for transportation data collection is no longer good enough
    • The types of Massive Mobile Data that are useful for transportation and urban planning
    • Algorithmic processing techniques that are critical for making this data useful
    • Case studies from California and Virginia that demonstrate why Massive Mobile Data drives more effective transportation planning
    • A forward-looking blueprint for using Massive Mobile Data to maximize the potential benefits of new transportation technologies - and minimize negative impacts

    Laura Schewel founded StreetLight Data, a mobility analytics provider, after spending more than a decade as an advanced transportation researcher and statistician at the Rocky Mountain Institute and FERC. She has particular expertise in transportation systems, sustainability and safety, and vehicle/system modeling and analysis.
  • How IoT Will Make Healthcare Healthy, Wealthy, & Wise Jun 23 2017 5:00 pm UTC 45 mins
    Jarie Bolander, COO, Lab Sensor Solutions
    IoT is a technology that has the potential to make us healthy, wealthy, and wise especially in healthcare. Healthcare is just now adopting IoT to improve patient outcomes and decrease the cost of care.

    In this webinar, you’ll learn:

    - How to identify if an IoT solution will work for your use case.
    - What others in healthcare are using IoT for.
    - The challenges of IoT in healthcare
  • Your Car Is Betraying You -- Why Robust Security is Essential on the Road Jun 22 2017 9:00 pm UTC 60 mins
    Toby Weir-Jones, CEO, Weir-Jones and Associates
    Modern vehicles are, as Bruce Schneier recently put it, actually computers with wheels rather than cars with a computer added on. Every part of the vehicle's operation is supervised, logged, and managed by digital signals on a complex vehicle network. If you have a crash, your car will tell investigators if you were speeding or swerved to avoid the impact. If you spend too long dawdling at the convenience store instead of visiting your customers, your employer will know about it. If you waste fuel, drive dangerously, or don't turn your lights on when you should, it'll be recorded.

    This introduces a lot of familiar debates in security circles. Who owns the data? What counts as personally identifiable? What are acceptable standards for logging, retention, and disclosure? What happens if we get it wrong?

    The bad news is the vehicle landscape, like enterprise security, is badly fragmented. The good news is we've learned a lot of useful lessons over the past 20 years which can be brought to bear on the problem, so solving it shouldn't take another 20.

    In this presentation we'll review some of the mechanics of how vehicle data is generated, who can see it, and how it can be used and abused. We'll then talk about points of leverage for the industry, the manufacturers, the owners, and law enforcement, and see what common ground exists. Finally, we'll lay out some basic ideas any fleet operator or concerned individual can use to make decisions about what vehicles to use and how to manage the data footprints they generate.
  • Building Secure Vehicular Software Jun 22 2017 5:00 pm UTC 60 mins
    Dr. Mark Sherman, Technical Director, CERT / Software Engineering Institute, Carnegie Mellon University
    Software plays an expanding and critical role in the success of future vehicles such as automobiles and trucks. Novel technologies that depend on the flexibility of software create new vulnerabilities and new ways to attack systems. This talk explores the expanding landscape of vulnerabilities that accompany the increasing reliance on software and then examines some key steps to help mitigate the increased risk: development of appropriate requirements from an analysis of risks, techniques that can be applied during development, and evaluation approaches for existing systems. The talk will conclude with a view of emerging approaches to further improve the delivery and sustainment of such critical software.

    About the Presenter:
    Dr. Mark Sherman is the Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. His team focuses on foundational research on the life cycle for building secure software and on data-driven analysis of cyber security. Before coming to CERT, Dr. Sherman was at IBM and various startups, working on mobile systems, integrated hardware-software appliances, transaction processing, languages and compilers, virtualization, network protocols and databases. He has published over 50 papers on various topics in computer science.
  • Why Vendor Liability is Necessary to Secure Consumer IoT Jun 21 2017 10:00 am UTC 60 mins
    Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc.
    We live in an IoT world. Connected devices now include TVs, refrigerators, security systems, phones, music players, smart assistants, DSL modems, cars, and even toothbrushes. Besides privacy and personal security concerns, these devices pose significant risk of cyber attacks. IoT devices have been used in devastating DDoS attacks that have paralyzed key Internet services, emergency services, and heating systems. In addition to run-of-the-mill hackers and hacktivists, they are the first line of attack in any low-to-medium scale cyber conflict between nation states.

    Vulnerable IoT devices represent a direct threat to safety, life, property, business continuity, and general stability of the society.

    This talk will discuss the security challenges surrounding IoT devices, and what is needed for a balanced framework that forces vendors to implement a reasonable level of best practice without causing them undue burden and risk.

    About the Presenter:
    Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.
  • The Future of Agile Network Architectures & IoT Connectivity Jun 15 2017 3:00 pm UTC 60 mins
    Ahmed Banafa, Ryan Allphin, and Brenda Boehm
    The Internet of Things is upon us. Vast amounts of big data are quickly approaching and network traffic, latency and bandwidth are at higher demands than ever. Storing, transmitting, and analyzing this data from IoT devices will require a secure and agile network architecture. Network failover and network security will be of the utmost importance.

    How will these changes in demand and technologies have an impact on new standards and protocols? Will network communications between devices and the cloud be safe? Tune into this dynamic panel discussion with leading IoT and network experts for the state of IoT networks.

    Ahmed Banafa, SJSU Faculty Member and LinkedIn IoT Influencer
    Ryan Allphin, CTO, Cradlepoint
    Brenda Boehm, Chief Strategy Officer & Board Advisor, IoT Smart Solutions, TIA
  • Connected & Autonomous Vehicles: The Ecosystem Impacts of Automotive IoT Jun 14 2017 3:00 pm UTC 60 mins
    Haden Kirkpatrick, Esurance, Gaurav Bansal, Toyota ITC, Naren Ravi, American Honda Motor Company
    As cars become more data-centric and technology enabled, peripheral providers are increasingly trying to figure out what that means for their businesses. Other categories such as dealer services, insurance, sharing services, and even fast food providers are trying to determine what impacts, if any, a connected car will have.

    Join this webinar for a live panel discussion on:
    - The different technologies enabling connected vehicles
    - What role connectivity will play in autonomous vehicles, including safety
    - What will be the major catalysts for this major market shift?

    Moderated by: Haden Kirkpatrick, Head of Strategy & Innovation at Esurance
    Panelists: Gaurav Bansal, Senior Researcher, Cooperative Automated Driving, Toyota ITC & Naren Ravi, Technology Manager, Connected Vehicles, American Honda Motor Company, Inc.
  • Consumer IoT: Concerns and Opportunities Recorded: Apr 24 2017 2 mins
    Connected devices are taking over our daily lives. Over 40 million U.S. adults use wearables at least once a month. Around 33% of homeowners in the U.S. use Smart Home products. So, what is holding back consumers from taking the final leap and adopting the Internet of Things?

    The biggest challenges for the IoT adoption is customer perception that IoT devices are too expensive or are unsure of the benefits they provide. Privacy and security of IoT devices is also a cause for concern.

    How can your business overcome these obstacles to consumer IoT adoption? Learn how to jump the gap from early adopter buy-in to mass market success. Join the Internet of Things World 2017:

    * Use BRIGHT20 and save 20% off your IoT World 2017 registration.
  • Connectivity: The Key to IIoT Data Communications Recorded: Apr 5 2017 61 mins
    Dr. Rajive Joshi, Principal Solution Architect, Real-time Innovations Inc.
    Connectivity: The Key to IoT Data Communications
    Unlocking Interoperability via the Industrial Internet Connectivity Framework

    From a practical viewpoint, IIoT components and subsystems are built at different times, by different teams, and in different places. In order to interoperate, they need to be able to communicate meaningfully. In order to communicate, the underlying connectivity infrastructure must facilitate the exchange of information between the participants.

    The Industrial Internet Connectivity Framework (IICF) is a comprehensive resource for understanding Industrial Internet of Things (IIoT) connectivity considerations. Developed by international connectivity experts, the IICF defines the minimum expectations required to build next generation IIoT systems with syntactic interoperability between components and subsystems.
  • #Vault7 Happened. There’s No Going Back. Now What? Recorded: Mar 22 2017 60 mins
    Tony Busseri/Route1, Nick Bilogorskiy/Cyphort, Darin Andersen/CyberTECH, Jonathan Dambrot/Prevalent, James Carder/LogRhythm
    It's alleged that the CIA developed tools designed to spy on people, taking advantage of weaknesses in smart connected devices such as smart phones, smart TVs, smart personal assistants, and other household IoT technologies.

    In this discussion, we do a walk-through of what happened, what didn't happen, what systems and devices are impacted, and what data is involved in the leaks. Most importantly, we'll get some insight into what the larger societal impact of this could be.

    Join us for this in-depth conversation to learn:
    - Where stuff broke down.
    - Who is impacted, how are they impacted, and what’s at risk.
    - What the government can do to help.
    - What the commercial InfoSec community can do to help.
    - What consumers need to know to help (protect) themselves.

    Darin Andersen, Chairman & Founder, CyberTECH
    Nick Bilogorskiy, Sr. Director of Threat Operations, Cyphort
    Tony Busseri, CEO, Route1 Inc.
    Jonathan Dambrot, CEO & Co-Founder, Prevalent
    James Carder, CISO & VP of LogRhythm Labs

    Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
  • WikiLeaks Vault 7: Facts, Fiction & Implications Recorded: Mar 22 2017 61 mins
    Vince Tocce (Vince in the Bay), Jake Kouns (Risk Based Security), Kenesa Ahmad (WISP)
    Wikileaks recently published a throve of documents, "Vault 7 Year Zero", which they claim expose a wide-ranging hacking tools used by the Central Intelligence Agency (CIA). If true, these cyber-weapons include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. In some cases, it might use smart TVs and other IoT devices in cyber surveillance and espionage.

    Join this panel discussion and find out more about the Vault 7 leak:
    - Truth / Fiction
    - How likely are you to get hacked
    - Security and privacy implications
    - Long-term effect across the tech industry and its relationship with government agencies

    Vince Tocce a.k.a. Vince in the Bay

    Jake Kouns, CISO of Risk Based Security
    Kenesa Ahmad, Chair of Women in Security and Privacy (WISP)
  • What WikiLeaks Vault 7 Means for You and Your Organization Recorded: Mar 17 2017 61 mins
    Chenxi Wang, Jason Haddix, and Gaurav Banga
    WikiLeaks published thousands of CIA-related documents in March detailing the agency's cyber-espionage programs. WikiLeaks is calling the archive "Vault 7". Discover the facts behind the leaks and how they may affect you. Some of the industry's top cybersecurity experts will discuss what the Vault 7 leaks mean for organizations and industries, from a security and privacy perspective.

    Chenxi Wang, Founder, the Jane Bond Project
    Jason Haddix, Head of Security at Bugcrowd
    Gaurav Banga, Founder & CEO of a stealth mode cybersecurity startup
  • Why Critical Infrastructure Cybersecurity Is In a League of Its Own Recorded: Mar 15 2017 45 mins
    Paul Kurtz, CEO & Co-Founder, and Shimon Modi, Dir of Product & Technology at TruSTAR Technology
    It seems like it’s every other day the U.S. Government Accountability Office (GAO) is issuing a new critical infrastructure (CI) condemnation on a government agency or an intrepid security researcher is playing out what would happen to our electrical grid if a ransomware attack were to occur.

    But have we ever paused to consider exactly what it takes to protect critical infrastructure? In doing so, we can learn how to better protect ourselves.

    This session will highlight the similarities and differences of what it takes to protect critical infrastructure compared to the enterprise.

    Threat models are changing, which require a change in core capabilities necessary to protect CI. We’ll pull up some common tactics, techniques and procedures (TTPs) used in real world attacks using TruSTAR’s threat intelligence exchange platform to show how intelligence exchange can play a role in protecting CI in the future.

    This session will be led by Paul Kurtz, co-founder and CEO of TruSTAR Technology and former Senior Director for Critical Infrastructure Protection on the White House's Homeland Security Council (HSC), as well as Shimon Modi, Director of Product & Technology at TruSTAR and former Cybersecurity R&D Manager at Accenture Technology Labs, where he led the innovation strategy and build out of the Industrial IoT security capability.
  • The State of Cyber Defense in the Age of Hacks, Breaches and IoT Recorded: Mar 14 2017 64 mins
    Fred Wilmot (PacketSled), Usman Choudhary (ThreatTrack), Sushila Nair (NTT) Chris Roberts (Acalvio), Joseph Carson(Thycotic)
    Today, every organization is at risk of cyber attacks. It is no longer the question of if, but when. Attackers are motivated, sophisticated and not limited by national borders. With IoT devices increasing in adoption and becoming intrinsic elements in our smart city infrastructure, industrial control systems and transportation systems, improving cybersecurity is essential.

    Join this keynote panel and learn the latest trends in cyber attacks, hacks and breaches in an increasingly IoT world, and the recommendations on how to strengthen the security of our most critical assets.

    - Fred Wilmot, CTO of PacketSled

    - Usman Choudhary, Chief Product Officer at ThreatTrack
    - Chris Roberts, Chief Security Architect at Acalvio
    - Sushila Nair, Principal Consultant at NTT Security
    - Joseph Carson, Chief Security Scientist of Thycotic
  • Securing IoT: What Did We Learn From RSA 2017? Recorded: Mar 3 2017 58 mins
    Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor, Inc
    As the largest cybersecurity show on the earth, the RSA Conference always offers new products, insights and approaches to securing the latest connected devices. So with more Internet of Things (IoT) devices than ever before hitting the markets, what can be done to secure your corner of cyberspace. Let’s explore what we learned at the RSA Conference in San Francisco this year.

    About the Presenter:
    During his distinguished career, Dan Lohrmann has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Lohrmann joined Security Mentor, Inc. in August, 2014, and he currently serves as the Chief Security Officer (CSO) and Chief Strategist for this award-winning training company. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors.
  • Delivering Data Security with Hadoop and the IoT Recorded: Aug 9 2016 62 mins
    Robert D. Schneider, Partner at WiseClouds LLC, Reiner Kappenberger, HPE Security - Data Security
    The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side the surge of new devices has increased potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

    Data security is a fundamental enabler of the IoT, and if it is not prioritised the business opportunity will be undermined, so protecting company data is more urgent than ever before. The risks are huge and Hadoop comes with few safeguards, leaving it to organizations to add an enterprise security layer. Securing multiple points of vulnerability is a major challenge, although when armed with good information and a few best practices, enterprise security leaders can ensure attackers will glean nothing from their attempts to breach Hadoop.

    In this webinar we will discuss some steps to identify what needs protecting and apply the right techniques to protect it before you put Hadoop into production.
  • How the IoT hype is changing an entire industry Recorded: Apr 13 2016 44 mins
    Stefan Skarin, CEO, IAR Systems
    · IoT represents the biggest IT opportunity since decades. How to find the path of market or targeted audience?

    · The hype of IoT attracts a vast majority of new vendors, products and solutions. How to position, reposition your offering/message to find your niche and to be unique?

    · For a vendor of an end-to-end IoT solution there is a mix of business models to reach an one-stop-shop for the their customers. What could be of guidance in exploring new business models and what are the boundaries in making them successful RoI?

    · Is a “blue ocean strategy” a perfect concept to use for an IoT offering?

    · Much of IoT focus in offerings and media channels are consumer driven. How to make a consumer driven demand in a IoT B2B solution?
  • Requirements for Collecting and Analyzing IOT Data Recorded: Apr 7 2016 49 mins
    Dr. Stefan Radtke, CTO for Isilon, EMEA, EMC Emerging Technology Division
    In 2020, Gartner expects that more than 30 billion devices will be connected to the Internet, generating 44 Zetabytes of data. The Internet of Things (IoT) and data analytics will affect almost all industries and should be an important part of the business strategy.

    Using a smarter cities example, we’ll explain the analytics process and how it supports your business initiatives (from data to business decisions). We’ll illustrate why it is important to gather as much data as possible and how the data insight can help to answer relevant questions and to make informed decisions.

    With that in mind, we’ll discuss how an appropriate storage and analytics infrastructure should look like and what the requirements are. Some key aspects: the cost of copying data, multi-protocol access, scalability, performance, availability, enterprise features, ease of use and others.
Connecting the world one device at a time
Find content relevant to the Internet of Things (IoT) on this channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Internet of Things in the Enterprise: The data behind the risks
  • Live at: Sep 29 2015 5:00 pm
  • Presented by: Andrew Hay, Director of Security Research, OpenDNS & Meg Diaz, Product Marketing Manager, OpenDNS
  • From:
Your email has been sent.
or close