Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Internet of Things
Track organisors: Patrick W.J. Essers & Oscar A. Koeroo
Entrepreneurial innovation & education driving Europe's digital
transformation
Patrick W.J. Essers | Zuiderstrandtheater, Den Haag | October 14th 2016
About EIT Digital
• Pan-European vibrant Ecosystem of Innovation Hotspots
• Leading European organisation for innovation and education in ICT
• Over 150 partner universities, research centres and companies all over Europe
• Fostering innovative technology and entrepreneurial talent for economic growth and quality of life in Europe.
The four pillars of our strategy
Deep ERB integration inside Action Lines
T-shaped talents from Education Action Lines
European eco-system of top ERB partners
Accelerated Market delivery in strategic Innovation Action Lines
Digital Infrastructure
Digital Wellbeing
Digital Cities
Digital Industry
Digital Finance *
Our Schools attract and deliver top talents
• Coursera platform • EIT Digital platform
• 7 DTCs • I&E education provided in
all DTCs. • Summer Schools for all
Action Lines (364 participants)
2015: • 13 courses (HWB,
S&P, Big Data, …) • 235 learners
• 20 of the top European Universities providing EIT labelled programs
Partner Universities Online Platforms Co-Location Centres
Master School Doctoral School Professional School
Blended Education
Applicants Enrolled Graduates Applicants Enrolled Graduates
Action Lines deliver innovations to market, supported by our Accelerator
Idea Challenge 2016: 234 submissions
195 start-ups employ 1800 valuation 2015 € 800 Million
2016: 4 High Impact Initiatives & 38 Regular Activities
Call for proposals 2017: 94 submissions
2016: 50 new products & 87 new start-ups
Scaling up, Funding rounds, Customer acquisition, Exit
Digital Infrastructure
Digital Wellbeing
Digital Cities
Digital Industry
Digital Finance *
Deep ERB integration inside Action Lines
Entrepreneurship Innovation
Education
Business Communities Startups in Inno Activities
EIT Digital Accelerator Dedicated team + partner incubators
Countries with Arise Incubator partners
EIT Digital countries with Co Location Centres
Eligible EU 28 countries
Working together is creating success
?
The security by design challenge Securing all the things
Oscar Koeroo | Zuiderstrandtheater, Den Haag | October 14th 2016
Our KPN CISO mission Mission Our mission is to keep KPN reliable & secure and trusted by customers, partners and society
How Use the prevent-detect-respond-verify security life cycle
What Delivering secure products &
services to our customers Providing thought leadership
in the field of security.
Threat landscape @ KPN Actors Motivation Threat vector Impact Individual Hacker -Opportunistic
-Disenfranchised
-Opportunistic vulnerabilities -Insider
-Integrity of systems and data -Reputational and Brand loss -Regulatory
Hacktivists
-Targeted -Ideological -Political cause -Malicious havoc
-Compromise of 3rd Party & Service Provider -Volume, Targeted attack -Opportunistic vulnerabilities
-Disruption of operations -Defacement of public sites -Reputational and Brand loss
Cyber Criminal
-Illicit gain -Fraud -Identity Theft -Competitive Intelligence
-Insider -Data Breach -Intellectual Property theft
-Customer Privacy -Financial impact -Intellectual Property loss
State Actor -Geopolitical target -National Security gain -Disrupt others Critical Infra -Economic Espionage
-Advance Persistent Threat (time/assets) -SCADA/ ICS -3rd Party & Service Provider
-Critical Infra damage -Intellectual Property theft - Economic & Political destabilization
Real world examples – DDoS by webcams Graph source: cloudflare
IoT connectivity
IoT in healthcare
The connected/smart <anything>
The connected cow
Challenges today Communications • Authenticity
– Bootstrapping – Scale
• Integrity – Manipulation
• Confidentiality – Encrypted?
• Monitoring – Who sees what and where?
• Side channel attacks – Physical – Crypto based – Protocol based – Memory manipulation
Control • Upgrades • Always on • Key management • Trust in data
Accountability Service provider • Accountable for which
aspect? • Accountable how long?
End-user • I desire to do what I want
with my product. • ‘It still works, don’t touch it’
Challenges ahead • Hardening of device
– Software – Hardware
• Long term support models – Upgrade of firmware – Upgrade of hardware
• Trust models for IoT – Carrier security – Owner/fleet control – Application security
• Key mngmt is complicated
• Secure bootstrap of IoT device in its eco-system
• Reliable data/integrity • Defense opportunities
– Detect being part of a botnet • Uniform/standardized m2m
communications • Crypto-agility
– Quantum Computers will become commodity
• Always available