Sie sind auf Seite 1von 35

INTERNET OF THINGS:

WINTER IS COMING

Avi Rembaum | VP Security Solutions

©2018 Check Point


©2018 Software
Check Point Technologies Ltd.
Software Technologies Ltd. 1
“Winter is Coming” can mean a lot of things

©2018 Check Point Software Technologies Ltd. 2


There’s the paradise holiday
“Winter is Coming”
©2018 Check Point Software Technologies Ltd. 3
The “yay it’s snowing”
winter is coming
©2018 Check Point Software Technologies Ltd. 4
The real world
“Winter is Coming”

©2018 Check Point Software Technologies Ltd. 5


What would an IoT winter look like?
What would an IoT What’s a realistic
future look like? IoT winter forecast?

©2018 Check Point Software Technologies Ltd. 6


Number of Internet 80 Billion
connected devices
(Source: Forbes March 2016)

30 Billion

11 Billion

2016 2020 2025

©2018 Check Point Software Technologies Ltd. 7


Neural networks will link machines into cognitive systems
that predict outcomes humans cannot understand

New York Times – January 2018: This Cat Sensed Death. What if Computers Could, Too?

©2015 Check Point Software Technologies Ltd. 8


©2018 Check Point Software Technologies Ltd.
Predictive
manu-
Smart facturing
buildings
Fully
automated
production

On-
demand
inventory
Neural-
networked Cashier-
business Distributed, less retail
stores
planning virtualized Continuous
systems customer
feedback

Self-
driving
vehicles
LTE-
connected
fleets
Automated
route
planning
©2018 Check Point Software Technologies Ltd. 9
What will winter look like for IoT?

©2018 Check Point Software Technologies Ltd. 10


Can we imagine an embedded threat
that could infect everything?

©2018 Check Point Software Technologies Ltd. 11


Spectre and Meltdown

©2018 Check Point Software Technologies Ltd. 12


Could tens of thousands of small machines
attack us in a coordinated way?

©2018 Check Point Software Technologies Ltd. 13


©2018 Check Point Software Technologies Ltd. 14
That’s pretty bad…what really happened?

©2018 Check Point Software Technologies Ltd. 15


Wired Magazine: “How a Dorm Room Minecraft
Scam Brought Down the Internet”

©2018 Check Point Software Technologies Ltd. 16


Was that a one-off?

©2018 Check Point Software Technologies Ltd. 17


October 2017

Check Point publishes


research on IoTroop
(Netlab 360 called it Reaper)

Debate over size and


scope
Agreement over
urgency
©2015 Check Point Software Technologies Ltd. 18
Default Software
Passwords Vulnerabilities

©2018 Check Point Software Technologies Ltd. 19


IoT Winter for an
IT security admin

©2015 Check Point Software Technologies Ltd. 20


Business as usual is…
Patching 4,891 Windows desktops, 9,712 Windows servers, 742 Linux servers,
implementing 639 firewall rule-bases changes in 12 countries, analyzing the
drives of 19 infected PCs, reading through 18TB of logs to figure out why 17
applications showed increase latency during 3 holiday weekends after the CEO
freaks out that her Smartphone calendar doesn’t automatically sync with
Office365 when your family is celebrating 2 birthdays, an anniversary, and your
dog is at the vet because she developed ring worm from eating your son’s diaper

©2015 Check Point Software Technologies Ltd. 21


Now imagine adding lightbulbs
to your network

©2018 Check Point Software Technologies Ltd. 22


And consider the millions of systems,
physical
With a fully realized and virtual,
IoT program, one enterprise could
have tens that would
of millions of operate
networked systems
within your IoT program

©2015 Check Point Software Technologies Ltd. 23


©2018 Check Point Software Technologies Ltd.
How would you…

Keep Prevent Build and


attackers exploits of monitor
from vulnerable rules that
hitting OT systems cover
everything

©2018 Check Point Software Technologies Ltd. 24


TECHNOLOGY IS EVERYWHERE

The Internet of things BRINGS WITH IT NEW challenges

©2018 Check Point Software Technologies Ltd. 25


SOFTWARE – DEFINED PROTECTION

MANAGEMENT LAYER
Integrates security with business
process

CONTROL LAYER
Delivers real-time protections to the
enforcement points

ENFORCEMENT LAYER
Inspects traffic and enforces protection
in well-defined segments

©2018 Check Point Software Technologies Ltd. 26


Step 1 Step 2 Step 3
Segment based on risk Configure protections Automate MACs and
profiles to PREVENT monitoring

Place controls as close to the point of risk as possible,


with a rational assessment of acquisition and operational cost

©2018 Check Point Software Technologies Ltd. 27


CLOUD MOBILE THREAT
PREVENTION

CONSOLIDATED
SYSTEM
©2015 Check Point Software Technologies Ltd. 28
Like cloud, IoT will require new ways of
approaching
Centralized scale,
Variety of
dynamism and
Predictive autonomy
Automation
trust and protection intelligence and global
object form factors shared among monitoring
repositories all systems

©2015 Check Point Software Technologies Ltd. 29


We’re at GEN V and moving to GEN VI Gen VI

Gen V
Nano
Gen IV
Mega
Gen III

Gen II Payload

Gen I Applications

Networks

Virus

1990 2000 2010 2015 2017 2020

©2018 Check Point Software Technologies Ltd. 30


Embed security into
IoT systems and networks

©2015 Check Point Software Technologies Ltd. 31


And going deeper
into IoT device
software, virtual
systems and
containers

©2015 Check Point Software Technologies Ltd. 32


Security in the age of

THINGS
Telecom
cloud Healthcare
Smart cities
Utilities
Smart buildings

Smart homes
Automotive Manufacturing

Transportation
Energy
Banking
©2018 Check Point Software Technologies Ltd. 33
Take a
generational
Summary IoT brings a
new generation
leap of threats

Segmentation Risk profile


and threat operates at
prevention a new scale

Double It’s not the


down on end of the
architecture world

©2015 Check Point Software Technologies Ltd. 34


THANK YOU

©2018 Check Point


©2018 Software
Check Point Technologies Ltd.
Software Technologies Ltd. 35

Das könnte Ihnen auch gefallen