|By Elizabeth White||
|June 3, 2014 11:00 AM EDT||
Mr. George Romas is the Technical Director of the Cybersecurity Solutions Group at HP Enterprise Services, U.S. Public Sector.
SecuritySolutionsWatch.com: Thank you for joining us again today, George. It's been roughly one year since our first meeting when we spoke about building security in, continuous monitoring, and the process that HP undertakes to develop and deliver the right cybersecurity solutions to HP customers. But, one year feels like a decade in the IT space - so much has happened. Today we'd like to discuss with you the topic of IoT (the Internet of Things). We read with great interest your recent blog on this subject. If you don't mind, can you please share with us your primer on IoT?
George Romas: IoT is something that we discuss on a regular basis at HP and I am appreciative of the opportunity to share my ideas on the topic with you. As you know, today we live in a world where just about everything is connected. While the Internet connects computers, in concept, the IoT connects everything else. Solutions in this space are appearing rapidly within the consumer space, while interesting industrial applications are also being deployed (please see my above blog link for examples.) You can think of IoT as a network of connected processors and sensors, and the type of sensors are only limited by your imagination. Today, the consumer space is seeing an expansion in the sensor environment (weather, home, traffic, safety), fitness (health, exercise), and multimedia (streaming to multiple devices, remote control). Yet as embedded processors and sensors become smaller (think "nano-sized"), we will be able to monitor and manage nearly anything. This will impact a wide range of industries and markets, from more efficient utilization of IT infrastructure to transportation systems, to automation of daily personal tasks.
SecuritySolutionsWatch.com: The upside and benefits of IoT are clear... things get done "for us" not necessarily "by us." Today's smart home is perhaps a good example here - as homeowners can control their HVAC and security systems from anywhere, at any time. Forgot to lower the heat when you left for vacation? Did you set the alarm... lock the door? No problem - just do it when you land in Hong Kong - or on the way there - or even your house can be programmed to do it automatically upon detecting your absence. And the convenience of being able to pay a bill, send a gift, check a stock price, find out who won the game, make a dinner reservation, respond to that customer - all in a matter of seconds with our mobile devices - makes us more efficient. But, we all know there are bad guys out there. Are we now also more vulnerable? Does IoT also mean an Internet of greater risk (IoGR)? Should I worry that my iPhone is a target? What are your thoughts?
George Romas: I'd like to start the conversation by talking about extremes. Let's take security out of the equation and assume that everything is connected and life is easy. Just as you outline, we can automate many of our daily tasks, both personal and business. In this scenario, we have processors and sensors everywhere that know your location, behavior, preferences, schedule, tasks, goals, hobbies, etc. This aligns with the typical science fiction depiction of the future: your house wakes you up, adjusts lighting and temperature, breakfast is ready, and clothes are picked out according to your activities that day. Your self-driving car has reviewed current traffic patterns and whisks you off to work while you answer emails and catch up on the news. Your day is already scheduled for you and meetings, phone calls and tasks occur without you having to think about or plan them. The rest of the day proceeds similarly, with everything planned and scheduled by the algorithms and machines around us.
Now, to answer your question - yes, you should worry! All the components of this scenario and the interactions between them are vulnerable to manipulation and disruption. Without security in the equation, that utopian day can quickly devolve into chaos and danger. Each benefit I described also introduces vulnerabilities because by connecting open networks to physical objects and personal information, you're opening yourself to a variety of threats and attacks.
SecuritySolutionsWatch.com: Your colleague at HP, Sridhar Solur, Director, Next-Gen Computing and Cloud Services, presented some eye-opening statistics in his recent IoT presentation - one example being that by 2025 more than one trillion devices will be connected to the Internet. With all these mobile devices coming into the workplace with access to the network, what is your perspective on "best practices" that should be followed by a government agency, a bank, a hospital, an oil and gas company, the transportation entity, or other enterprises that employ owners of those devices?
George Romas: As I previously mentioned, security is of the utmost importance when it comes to more and more devices being connected to the Internet, especially as employees bring them to the workplace. One trillion devices globally translate into trillions of attack surfaces. Conversely, having "too much" security doesn't work either, as the nature of IoT requires real-time response. If devices and communications are locked down, and each transaction has to be authenticated, the system would become unusable due to performance and timing issues. Instead, I recommend leveraging the security frameworks that are well known - for example, privacy, data or HIPAA protections - and building the capabilities needed to implement those frameworks into IoT protocols; combining it with approaches to design security in. While some of these capabilities don't exist yet, as I outlined in my blog, there are initiatives to provide both better interoperability and better security for the IoT. More information about these initiatives can be found on my HP blog post, "The Internet of (Secure) Things - Embedding Security in the IoT." We have to walk the fine line between the benefits that come with IoT and the complexity of securing the IoT ecosystem - from human identities to critical infrastructure.
SecuritySolutionsWatch.com: Can we discuss data analytics for a moment? With sensors everywhere that monitor our behavior, our health, as well as the performance of the machines we depend on in our personal and business lives, IoT delivers powerful information that can be monetized. Do you envision certain industries being transformed and other new industries being created as a result of IoT?
George Romas: In transforming industries and our lives, the benefits of IoT are as obvious as its potential abuses. For instance, think of the possible health and medical advances that could be realized by tracking the details of individual diet, exercise and behaviors across an entire population. We don't think twice about allowing our shopping preferences to be tracked so that we can enjoy discounts and targeted coupons. Why wouldn't we do the same if it meant better health and longer life? Instead of just tracking you, IoT devices could modify your life, for a fee, to continuously monitor and optimize the changes in your health; for instance, your refrigerator could substitute items on your shopping list or in your recipes (e.g., substituting Truvia for sugar, or egg whites for whole eggs). Your daily schedule could be modified to include more exercise. Devices could continuously monitor and optimize the changes in your health. Yet, however, if the appropriate security controls are not implemented, the possibility of abuse can be equally envisioned. This same private data could instead be used to target ads and promotions to every individual, monetizing every behavior and preference, or in an extreme case, substituting a deadly allergen or poison as a new form of attack. Instead of optimization, the goal could become consumption, or even a bizarre deadly health hazard.
Thinking about the availability of massive amounts of data that will be collected, I can imagine many novel uses for that information. Integrate streaming video from drones with transportation schedules, weather data, traffic cams/statistics (air, rail and road), and more, to automatically find the optimal route and mode of transportation to-and-from anywhere to anywhere. Provide dates, destination and "family vacation" details to a travel system and your experience can be enhanced as the system could make all of your reservations (at the cheapest rates) for you.
In addition, IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities.
An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smartphone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house.
In the workplace, the information gathered from IoT can be leveraged in a number of ways. It identifies and authenticates you to physical and cyber systems, alerting on anomalous behaviors and providing single sign-on access to the resources required for your job/role. Your workplace can utilize this information to better plan and operate IT resources. In addition, a virtual CIO/CISO can continually and minutely monitor performance and security of corporate systems. This information also feeds into business processes, optimizing all the components needed to reach corporate goals.
SecuritySolutionsWatch.com: While we're on the subject of front-page news, more security inevitably means more cost and less convenience to users. Are we going to have to bite the bullet and make these adjustments?
George Romas: Yes, but we have the opportunity to do this the correct way. As Sridhar noted, IoT devices will be ubiquitous. Investing more today in developing the proper protections and protocols must be done. These protections will speed adoption, and economies of scale will more than pay for today's investment. Just do a Web search for "IoT" and you'll see a large number of companies and open source initiatives working in this market. We have to work towards a common, secure framework to provide these solutions with a resilient, assured environment to operate in.
SecuritySolutionsWatch.com: Thank you again for joining us today. Are there any other subjects you'd like to talk about?
George Romas: In some ways, I consider myself a futurist, in the same way that science fiction authors can sometimes accurately predict future technologies and solutions. When I think of what IoT may look like in 2025, with possibly one trillion devices (a global network of sensors), I can't help but think of Isaac Asimov's Foundation series of science fiction novels. He created the science of psychohistory - by combining the studies of history, sociology and statistics against large populations, you could accurately predict the flow of future events. Imagine that unprecedented collection of current and past human behavior on a global scale.
HP is prepared for this explosion of data with scalable big data management and analytics platforms like HAVEn and Autonomy - designed to help enterprises leverage all your relevant Big Data, to make more informed decisions. However, for the time being, my parting thought is to ask, is it too far of a leap to believe that we could create algorithms that could predict future human behavior and consequent events? Just something to ponder....
This interview originally appeared in SecuritySolutionsWatch.com. Republished with permission.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Dec. 8, 2016 07:00 AM EST Reads: 1,691
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 06:30 AM EST Reads: 1,114
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Dec. 8, 2016 06:15 AM EST Reads: 5,909
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Dec. 8, 2016 05:00 AM EST Reads: 2,159
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
Dec. 8, 2016 04:30 AM EST Reads: 732
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 04:15 AM EST Reads: 946
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Dec. 8, 2016 04:00 AM EST Reads: 3,798
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Dec. 8, 2016 04:00 AM EST Reads: 4,815
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 04:00 AM EST Reads: 1,046
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 8, 2016 02:45 AM EST Reads: 1,300
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 8, 2016 02:30 AM EST Reads: 1,120
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Dec. 8, 2016 01:45 AM EST Reads: 1,410
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 8, 2016 01:30 AM EST Reads: 1,926
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 8, 2016 01:00 AM EST Reads: 3,957
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 8, 2016 12:30 AM EST Reads: 1,137