SlideShare a Scribd company logo
1 of 27
Download to read offline
Workshop by Moriya Kassis
Avoid embarrassing press by
designing secure IoT products
Talk by Misha Seltzer,
Chief Solution Architect at
Let’s Productise!
I am Misha Seltzer
I am here because I love to give presentations.
You can find me at misha-seltzer
2
IoT
Security is
importantLet’s first see why...
3
20+ Billion
Connected devices in enterprises
Biggest growth in devices businesses have seen.
Bigger than PC and mobile combined.
Armis is an industry leading company that
protects enterprises and enables them to
safely use IoT devices.
Armis’ mission:
Eliminate the IoT security blind spot, letting
enterprises discover and protect every
asset, and to use IoT and unmanaged
devices safely and securely.
What is ?
5
How can we protect a device we’ve never seen?
We’re looking at parameters like:
▰ What kind of data is transmitted?
▰ How much data is transmitted?
▰ Is the transmission encrypted?
▰ What protocols are used?
▰ [...]
How can we protect a device we’ve never seen?
We’re looking at parameters like:
▰ What kind of data is transmitted?
▰ How much data is transmitted?
▰ Is the transmission encrypted?
▰ What protocols are used?
▰ [...]
▰ Manufacturer reputation
60% of Companies Fail in 6 Months Because
of This (It's Not What You Think)
https://www.inc.com/thomas-koulopoulos/the-biggest-risk-to-your-business-cant-be-eliminated
-heres-how-you-can-survive-i.html
Cisco: Most IoT projects are failing due to
lack of experience and security
https://www.zdnet.com/article/cisco-most-iot-projects-are-failing-due-to-lack-of-experience-and-
security/
Some stats to prove my point
8
Some
Examples
And lessons learned
9
Protect your data
And encrypt it
10
1
“Hacked Smart Pens Can Lead to Data Breaches”
[...] was able to access
the backend servers
used by the healthcare
organization and view
sensitive information on
patients of several
doctors who used the
smart pens.
11
https://www.hipaajournal.com/exploitable-iv-infusion-pump-digital-smart-pen-vulnerabilities/
“
So - what to encrypt?
It’s important to encrypt
absolutely everything.
Both in rest and in
transit.
Use standard ciphers
and protocols. Do not
reinvent the wheel.
12
Data from IoT devices is usually easier to
steal, due to
▰ Increased connectivity
▰ The nature of its placement
▰ Many instances - easy to physically steal
▰ Hack one - hack all
Why is it different from other software/hardware?
13
PM Perspective
14
Compromising battery life or price of device for
encryption might seem excessive at this point,
but catching up later will be way more difficult.
▰ Do not delay work on data encryption
▰ Make sure sufficient separation is in place:
Do not let one compromised device get to
data of another device
Ensure your supply chain
It’s your responsibility to verify the your
manufacturers
15
2
“Police body cams found pre-installed with
notorious Conficker worm”
[...] multiple police cams
manufactured by Martel
Electronics came
pre-installed with
Win32/Conficker.B!inf.
16
https://arstechnica.com/information-technology/2015/11/police-body-cams-found-pre-installed-with-notorious-conficker-worm/
“
The responsibility is yours alone
The chinese factory may lose one client,
but you will lose all of yours.
▰ Make sure your supply chain has
security certifications (ISO, SOC, …)
▰ Routinely check product & production
▰ Recommend to your suppliers :)
17
PM Perspective
18
In many cases it’s up to the PM to choose the
manufacturer, and it’s up to the PM to oversee
production and quality.
▰ Don’t just choose the cheapest option
▰ Create a QA pipeline that is aware of security
▰ Make sure to routinely check on suppliers,
and insist on third-party security screenings
Updatability is key
You can’t protect against future
vulnerabilities … yet
19
3
Use the newest OS, Libraries, Tools. Always.
How long does it take to
acquire malware after
installing Windows XP?
In 2008, according to
SANS Institute, it was 4
minutes (!!)
https://isc.sans.edu/diary/Survival+Time+on+the+Internet/4721
Who would do such a thing?
Philips 3.0T Ingenia
State of the art MRI
machine
Price: >$400,000
OS: Windows XP (!?)
Even the giants sin
Amazon echo uses
kernel v2.6.37
The EOL for this kernel
was March 2011 (!!)
How to use only the newest?
Even if you’ll only use the newest, it’ll
already be obsolete by the time to market
▰ Plan for updateability from day one
▰ Have routine sprints for updates
▰ IoT device should update automagically
23
PM Perspective
24
Creating a system for future updates might not
seem like the most pressing task at first, but it
becomes increasingly tougher as time goes on.
▰ Setting up time, and implementing well
early will save much valuable time later on
▰ IoT security is a hot topic right now, and
having the most up-to-date product can be
a good PR strategy
Summary
25
Secure your devices
The examples above are just a some anecdotes,
don’t let your company become another one.
Remember: Trust is hard to find, and easy to lose.
26
THANKS!
Any questions?

More Related Content

What's hot

Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicCheapest SSLs
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of ThingsRishabh Sharma
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016David Glover
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 

What's hot (20)

Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographic
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 

Similar to Secure IoT Workshop on Avoiding Embarrassing Press and Designing Secure Products

Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxkris harden
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofAdrian Sanabria
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 

Similar to Secure IoT Workshop on Avoiding Embarrassing Press and Designing Secure Products (20)

Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 

More from Product of Things

With tangible products, comes tangible pain: how to better predict problems i...
With tangible products, comes tangible pain: how to better predict problems i...With tangible products, comes tangible pain: how to better predict problems i...
With tangible products, comes tangible pain: how to better predict problems i...Product of Things
 
Match the supply chain for your product needs with Amit Rotenberg
Match the supply chain for your product needs with Amit RotenbergMatch the supply chain for your product needs with Amit Rotenberg
Match the supply chain for your product needs with Amit RotenbergProduct of Things
 
‘Mapping the IoT Toolkit’ an open research to design meaningful smart product...
‘Mapping the IoT Toolkit’ an open research to design meaningful smart product...‘Mapping the IoT Toolkit’ an open research to design meaningful smart product...
‘Mapping the IoT Toolkit’ an open research to design meaningful smart product...Product of Things
 
Making better ‘things’ using Design Thinking with Yorai Gabriel
Making better ‘things’ using Design Thinking with Yorai GabrielMaking better ‘things’ using Design Thinking with Yorai Gabriel
Making better ‘things’ using Design Thinking with Yorai GabrielProduct of Things
 
Empathetic Strategy: Design mindset for product innovation in the age of acce...
Empathetic Strategy: Design mindset for product innovation in the age of acce...Empathetic Strategy: Design mindset for product innovation in the age of acce...
Empathetic Strategy: Design mindset for product innovation in the age of acce...Product of Things
 
Pushing traditional manufacturers towards agile hardware manufacturing with D...
Pushing traditional manufacturers towards agile hardware manufacturing with D...Pushing traditional manufacturers towards agile hardware manufacturing with D...
Pushing traditional manufacturers towards agile hardware manufacturing with D...Product of Things
 
IoF - Internet of Farms - How the digital revolution is changing the agricult...
IoF - Internet of Farms - How the digital revolution is changing the agricult...IoF - Internet of Farms - How the digital revolution is changing the agricult...
IoF - Internet of Farms - How the digital revolution is changing the agricult...Product of Things
 
Product and UX lessons learned from 100 IoT companies with Jonathan Seroussi
Product and UX lessons learned from 100 IoT companies with Jonathan SeroussiProduct and UX lessons learned from 100 IoT companies with Jonathan Seroussi
Product and UX lessons learned from 100 IoT companies with Jonathan SeroussiProduct of Things
 
Be ready for personalized augmented reality experiences with Lior Romanwosky
Be ready for personalized augmented reality experiences with Lior RomanwoskyBe ready for personalized augmented reality experiences with Lior Romanwosky
Be ready for personalized augmented reality experiences with Lior RomanwoskyProduct of Things
 
Build your first IoT device - The tricky interface of Product and R&D with Ni...
Build your first IoT device - The tricky interface of Product and R&D with Ni...Build your first IoT device - The tricky interface of Product and R&D with Ni...
Build your first IoT device - The tricky interface of Product and R&D with Ni...Product of Things
 
The IoT on-boarding challenge: Software, people, and things with Noam Mantel
The IoT on-boarding challenge: Software, people, and things with Noam MantelThe IoT on-boarding challenge: Software, people, and things with Noam Mantel
The IoT on-boarding challenge: Software, people, and things with Noam MantelProduct of Things
 
Your challenge is not to sell products but to profitably manage products with...
Your challenge is not to sell products but to profitably manage products with...Your challenge is not to sell products but to profitably manage products with...
Your challenge is not to sell products but to profitably manage products with...Product of Things
 
Make sure your product doesn’t only follow but also lead tomorrow’s tech with...
Make sure your product doesn’t only follow but also lead tomorrow’s tech with...Make sure your product doesn’t only follow but also lead tomorrow’s tech with...
Make sure your product doesn’t only follow but also lead tomorrow’s tech with...Product of Things
 
"Product Architecture: failures and lessons learnt" - Royi Benyossef @Product...
"Product Architecture: failures and lessons learnt" - Royi Benyossef @Product..."Product Architecture: failures and lessons learnt" - Royi Benyossef @Product...
"Product Architecture: failures and lessons learnt" - Royi Benyossef @Product...Product of Things
 
"Lean startups : what happens when you put hardware into the mix?" - Gal Shau...
"Lean startups : what happens when you put hardware into the mix?" - Gal Shau..."Lean startups : what happens when you put hardware into the mix?" - Gal Shau...
"Lean startups : what happens when you put hardware into the mix?" - Gal Shau...Product of Things
 
"Breaking the tech barrier: difficulties of going smart for non tech teams" -...
"Breaking the tech barrier: difficulties of going smart for non tech teams" -..."Breaking the tech barrier: difficulties of going smart for non tech teams" -...
"Breaking the tech barrier: difficulties of going smart for non tech teams" -...Product of Things
 
"Bridging the gap between prototypes and production" - Odi Dahan @Products_of...
"Bridging the gap between prototypes and production" - Odi Dahan @Products_of..."Bridging the gap between prototypes and production" - Odi Dahan @Products_of...
"Bridging the gap between prototypes and production" - Odi Dahan @Products_of...Product of Things
 
“It’s Not About Sensor Making, it’s About Sense Making” - Moriya Kassis @Prod...
“It’s Not About Sensor Making, it’s About Sense Making” - Moriya Kassis @Prod...“It’s Not About Sensor Making, it’s About Sense Making” - Moriya Kassis @Prod...
“It’s Not About Sensor Making, it’s About Sense Making” - Moriya Kassis @Prod...Product of Things
 
“Medical Robotics - Perception & Reality - The R&D challenge” - Yossi Bar @Pr...
“Medical Robotics - Perception & Reality - The R&D challenge” - Yossi Bar @Pr...“Medical Robotics - Perception & Reality - The R&D challenge” - Yossi Bar @Pr...
“Medical Robotics - Perception & Reality - The R&D challenge” - Yossi Bar @Pr...Product of Things
 

More from Product of Things (19)

With tangible products, comes tangible pain: how to better predict problems i...
With tangible products, comes tangible pain: how to better predict problems i...With tangible products, comes tangible pain: how to better predict problems i...
With tangible products, comes tangible pain: how to better predict problems i...
 
Match the supply chain for your product needs with Amit Rotenberg
Match the supply chain for your product needs with Amit RotenbergMatch the supply chain for your product needs with Amit Rotenberg
Match the supply chain for your product needs with Amit Rotenberg
 
‘Mapping the IoT Toolkit’ an open research to design meaningful smart product...
‘Mapping the IoT Toolkit’ an open research to design meaningful smart product...‘Mapping the IoT Toolkit’ an open research to design meaningful smart product...
‘Mapping the IoT Toolkit’ an open research to design meaningful smart product...
 
Making better ‘things’ using Design Thinking with Yorai Gabriel
Making better ‘things’ using Design Thinking with Yorai GabrielMaking better ‘things’ using Design Thinking with Yorai Gabriel
Making better ‘things’ using Design Thinking with Yorai Gabriel
 
Empathetic Strategy: Design mindset for product innovation in the age of acce...
Empathetic Strategy: Design mindset for product innovation in the age of acce...Empathetic Strategy: Design mindset for product innovation in the age of acce...
Empathetic Strategy: Design mindset for product innovation in the age of acce...
 
Pushing traditional manufacturers towards agile hardware manufacturing with D...
Pushing traditional manufacturers towards agile hardware manufacturing with D...Pushing traditional manufacturers towards agile hardware manufacturing with D...
Pushing traditional manufacturers towards agile hardware manufacturing with D...
 
IoF - Internet of Farms - How the digital revolution is changing the agricult...
IoF - Internet of Farms - How the digital revolution is changing the agricult...IoF - Internet of Farms - How the digital revolution is changing the agricult...
IoF - Internet of Farms - How the digital revolution is changing the agricult...
 
Product and UX lessons learned from 100 IoT companies with Jonathan Seroussi
Product and UX lessons learned from 100 IoT companies with Jonathan SeroussiProduct and UX lessons learned from 100 IoT companies with Jonathan Seroussi
Product and UX lessons learned from 100 IoT companies with Jonathan Seroussi
 
Be ready for personalized augmented reality experiences with Lior Romanwosky
Be ready for personalized augmented reality experiences with Lior RomanwoskyBe ready for personalized augmented reality experiences with Lior Romanwosky
Be ready for personalized augmented reality experiences with Lior Romanwosky
 
Build your first IoT device - The tricky interface of Product and R&D with Ni...
Build your first IoT device - The tricky interface of Product and R&D with Ni...Build your first IoT device - The tricky interface of Product and R&D with Ni...
Build your first IoT device - The tricky interface of Product and R&D with Ni...
 
The IoT on-boarding challenge: Software, people, and things with Noam Mantel
The IoT on-boarding challenge: Software, people, and things with Noam MantelThe IoT on-boarding challenge: Software, people, and things with Noam Mantel
The IoT on-boarding challenge: Software, people, and things with Noam Mantel
 
Your challenge is not to sell products but to profitably manage products with...
Your challenge is not to sell products but to profitably manage products with...Your challenge is not to sell products but to profitably manage products with...
Your challenge is not to sell products but to profitably manage products with...
 
Make sure your product doesn’t only follow but also lead tomorrow’s tech with...
Make sure your product doesn’t only follow but also lead tomorrow’s tech with...Make sure your product doesn’t only follow but also lead tomorrow’s tech with...
Make sure your product doesn’t only follow but also lead tomorrow’s tech with...
 
"Product Architecture: failures and lessons learnt" - Royi Benyossef @Product...
"Product Architecture: failures and lessons learnt" - Royi Benyossef @Product..."Product Architecture: failures and lessons learnt" - Royi Benyossef @Product...
"Product Architecture: failures and lessons learnt" - Royi Benyossef @Product...
 
"Lean startups : what happens when you put hardware into the mix?" - Gal Shau...
"Lean startups : what happens when you put hardware into the mix?" - Gal Shau..."Lean startups : what happens when you put hardware into the mix?" - Gal Shau...
"Lean startups : what happens when you put hardware into the mix?" - Gal Shau...
 
"Breaking the tech barrier: difficulties of going smart for non tech teams" -...
"Breaking the tech barrier: difficulties of going smart for non tech teams" -..."Breaking the tech barrier: difficulties of going smart for non tech teams" -...
"Breaking the tech barrier: difficulties of going smart for non tech teams" -...
 
"Bridging the gap between prototypes and production" - Odi Dahan @Products_of...
"Bridging the gap between prototypes and production" - Odi Dahan @Products_of..."Bridging the gap between prototypes and production" - Odi Dahan @Products_of...
"Bridging the gap between prototypes and production" - Odi Dahan @Products_of...
 
“It’s Not About Sensor Making, it’s About Sense Making” - Moriya Kassis @Prod...
“It’s Not About Sensor Making, it’s About Sense Making” - Moriya Kassis @Prod...“It’s Not About Sensor Making, it’s About Sense Making” - Moriya Kassis @Prod...
“It’s Not About Sensor Making, it’s About Sense Making” - Moriya Kassis @Prod...
 
“Medical Robotics - Perception & Reality - The R&D challenge” - Yossi Bar @Pr...
“Medical Robotics - Perception & Reality - The R&D challenge” - Yossi Bar @Pr...“Medical Robotics - Perception & Reality - The R&D challenge” - Yossi Bar @Pr...
“Medical Robotics - Perception & Reality - The R&D challenge” - Yossi Bar @Pr...
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Secure IoT Workshop on Avoiding Embarrassing Press and Designing Secure Products

  • 1. Workshop by Moriya Kassis Avoid embarrassing press by designing secure IoT products Talk by Misha Seltzer, Chief Solution Architect at
  • 2. Let’s Productise! I am Misha Seltzer I am here because I love to give presentations. You can find me at misha-seltzer 2
  • 4. 20+ Billion Connected devices in enterprises Biggest growth in devices businesses have seen. Bigger than PC and mobile combined.
  • 5. Armis is an industry leading company that protects enterprises and enables them to safely use IoT devices. Armis’ mission: Eliminate the IoT security blind spot, letting enterprises discover and protect every asset, and to use IoT and unmanaged devices safely and securely. What is ? 5
  • 6. How can we protect a device we’ve never seen? We’re looking at parameters like: ▰ What kind of data is transmitted? ▰ How much data is transmitted? ▰ Is the transmission encrypted? ▰ What protocols are used? ▰ [...]
  • 7. How can we protect a device we’ve never seen? We’re looking at parameters like: ▰ What kind of data is transmitted? ▰ How much data is transmitted? ▰ Is the transmission encrypted? ▰ What protocols are used? ▰ [...] ▰ Manufacturer reputation
  • 8. 60% of Companies Fail in 6 Months Because of This (It's Not What You Think) https://www.inc.com/thomas-koulopoulos/the-biggest-risk-to-your-business-cant-be-eliminated -heres-how-you-can-survive-i.html Cisco: Most IoT projects are failing due to lack of experience and security https://www.zdnet.com/article/cisco-most-iot-projects-are-failing-due-to-lack-of-experience-and- security/ Some stats to prove my point 8
  • 10. Protect your data And encrypt it 10 1
  • 11. “Hacked Smart Pens Can Lead to Data Breaches” [...] was able to access the backend servers used by the healthcare organization and view sensitive information on patients of several doctors who used the smart pens. 11 https://www.hipaajournal.com/exploitable-iv-infusion-pump-digital-smart-pen-vulnerabilities/ “
  • 12. So - what to encrypt? It’s important to encrypt absolutely everything. Both in rest and in transit. Use standard ciphers and protocols. Do not reinvent the wheel. 12
  • 13. Data from IoT devices is usually easier to steal, due to ▰ Increased connectivity ▰ The nature of its placement ▰ Many instances - easy to physically steal ▰ Hack one - hack all Why is it different from other software/hardware? 13
  • 14. PM Perspective 14 Compromising battery life or price of device for encryption might seem excessive at this point, but catching up later will be way more difficult. ▰ Do not delay work on data encryption ▰ Make sure sufficient separation is in place: Do not let one compromised device get to data of another device
  • 15. Ensure your supply chain It’s your responsibility to verify the your manufacturers 15 2
  • 16. “Police body cams found pre-installed with notorious Conficker worm” [...] multiple police cams manufactured by Martel Electronics came pre-installed with Win32/Conficker.B!inf. 16 https://arstechnica.com/information-technology/2015/11/police-body-cams-found-pre-installed-with-notorious-conficker-worm/ “
  • 17. The responsibility is yours alone The chinese factory may lose one client, but you will lose all of yours. ▰ Make sure your supply chain has security certifications (ISO, SOC, …) ▰ Routinely check product & production ▰ Recommend to your suppliers :) 17
  • 18. PM Perspective 18 In many cases it’s up to the PM to choose the manufacturer, and it’s up to the PM to oversee production and quality. ▰ Don’t just choose the cheapest option ▰ Create a QA pipeline that is aware of security ▰ Make sure to routinely check on suppliers, and insist on third-party security screenings
  • 19. Updatability is key You can’t protect against future vulnerabilities … yet 19 3
  • 20. Use the newest OS, Libraries, Tools. Always. How long does it take to acquire malware after installing Windows XP? In 2008, according to SANS Institute, it was 4 minutes (!!) https://isc.sans.edu/diary/Survival+Time+on+the+Internet/4721
  • 21. Who would do such a thing? Philips 3.0T Ingenia State of the art MRI machine Price: >$400,000 OS: Windows XP (!?)
  • 22. Even the giants sin Amazon echo uses kernel v2.6.37 The EOL for this kernel was March 2011 (!!)
  • 23. How to use only the newest? Even if you’ll only use the newest, it’ll already be obsolete by the time to market ▰ Plan for updateability from day one ▰ Have routine sprints for updates ▰ IoT device should update automagically 23
  • 24. PM Perspective 24 Creating a system for future updates might not seem like the most pressing task at first, but it becomes increasingly tougher as time goes on. ▰ Setting up time, and implementing well early will save much valuable time later on ▰ IoT security is a hot topic right now, and having the most up-to-date product can be a good PR strategy
  • 26. Secure your devices The examples above are just a some anecdotes, don’t let your company become another one. Remember: Trust is hard to find, and easy to lose. 26