h jasons risk and rewards the business of iotdisrupt or be disrupted an approach for industry...
TRANSCRIPT
1
Risk and Rewards:
The Business of IoT
Introductions
Jason Ortiz
Sr. Product Engineer
Jason Pennington
Executive Director
1
2
2
Risk and Rewards: The Business of IoT
IoT Growth Value Creation
Why and Why Not
What is the IoT?
3
4
3
The Internet of Things (IoT)
Hype
Anxiety and confusion
Reality
The Internet of Things (IoT)
Simply put, the IoT connects things to other things and the internet
5
6
4
Ability to expand our lense
Look beyond traditional processes
Explore and integrate a value chain
Address opportunity and challenges like never before
Why does it matter?
7
8
5
Our economic engines
Use cases, problems, and realities
Disrupt or be disrupted
An approach for industry
Availability
Productivity at work becomes convenience, safety, and security at home
DIY ability
The world around us
9
10
6
Connected Things
IoT Devices and Connected Things
Growth
Convergence
Our Work LifeAdoption Rate ~ 12 to 18% of US industrial operations leverage IoT in 2019
Our Home LifeAdoption Rate ~ about 8 to 14% of US homes were connected in 2019
11
12
7
Then ~ 1968Apollo 5 Guidance Computer (AGC)
- 1MHz, 16 Bit Processor, $150K
NowRaspberry Pi(4) Prototype Computer
-Quad Core, 1.5GHz, 64 Bit Processor, $35
So What? Connected ExperiencesBecoming connected ubiquity
What’s the big deal?By 2025, we will produce >460EB (18 zeroes) of data per day.
The Internet of EverythingValue creation and digital bliss.
13
14
8
Easy to do
Cost
Connectivity
Trough of disillusionment...
Consider historical adoption
Awareness
Understanding
Expectations
Cost
Wants and Needs
Infrastructure
15
16
9
Awareness
Concerns
Wants and Needs
Integration
Infrastructure
Cost
2020 a tipping point?
Value Creation The Business CaseEvolving with innovation
Innovation and DomainDisruptive and incremental innovation that fits
The customer experienceIf no one buys it, it doesn’t matter
17
18
10
Strategic Objective
Value vs. Cost
Forecast
Targeted benefit
Risk register
Current vs. Future Cash Flow and NPV
The classical business case
Our wants and needs haven’t really changed, but our expectations have…
We can start to think of IoT as concept to enable value creation
But in the end, we want a result
Expectations
19
20
11
Problem InnovationHow well are we positioned in our domain?
How well do we understand the problem?
Market Positioning What do our customers expect from us?
What is the market prepared to accept?
Elements of classical business case
Customer experience
Acumen to look from the outside in
The business case became a brand story
Updated business case
21
22
12
Why and Why Not?
What we were taughtHow we do it
What it does
How we evolved Customers buy our why and our story.
Offering is only part of our brand experience
23
24
13
How we bring things to market
People centric
Mass customization
Speed and flexibility to adapt
Design Thinking
The thing
The connection
The computing
The result
The context
Building success with IoT
25
26
14
The Business Case
vs.
The case for Innovation
The dilemma
The paradox of sharing to create a competitive or productive advantage
-transactions
-consumptions
-logistics
Consider...
27
28
15
Design + Destructive Thinking
29
30
16
A prerequisite to anything awesome
What perimeter do we protect with IoT?
How do we protect our information?
How do we protect our customer?
The Security Riddle...
Devices
Edge
Hub
Application and Network Servers
Cloud
Living on the Edge
31
32
17
Hybrid or no physical security
Scale and authentication
Simplicity and variability
Physical became Cyber Physical
Confidentiality
Integrity
Availability
Governance
Privacy
Data Became the Value
33
34
18
Theft
Breach (Loss)
Precision
Accuracy
The challenge with data is real...
How much time do we spend talking about protecting our
value?
Modern Value PropositionSecure by design
Cost of FailureBeyond a late delivery, product recall, or negative feedback
Deep InsightsInclusive consultancy
35
36
19
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
SECURITY SOLUTIONSSECURITY
● NIST Framework
https://www.nist.gov/cyberframework
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
SECURITY SOLUTIONSSECURITY
● Identification» Asset Management
» Unique ID of sensors/platforms/units
» Understand MOST critical components■ (A single sensor sometimes!)
37
38
20
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
SECURITY SOLUTIONSSECURITY
● Protection» AV Tools?
» Identity Management (RBAC)
» Training
» Policies
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
SECURITY SOLUTIONSSECURITY
● Detection» Detection = Monitoring & Alerting
» LOGGING IS CRITICAL
» Network profiles
» Data profiles
39
40
21
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
SECURITY SOLUTIONSSECURITY
● Response & Recovery» DR Plan!
» Critical components first ■ Even when simple
THREAT HUNTING AND RESPONSE | SECURITY CONSULTING
SECURITY EVOLUTIONSSECURITY
● New UL Framework● Testing● Certification
41
42
22
Rewards
The IoT deserves your intention as much as it deserves your attention
-modernize the business case
-create journeys for your customer
-protect value for your brand
-security by design
Questions?
Contact:[email protected]
Contact: [email protected]
43
44