19 Jan, ISSA Sacramento Chapter Meeting

Primary tabs

When: Friday, January 19, 11:30a-1:00p

Where: Arden-Dimick Library, 891 Watt Ave, Sacramento (NOTE: This location is different from other meetings)

Speaker: Russell Rice, Cloudpost Networks (https://www.cloudpostnetworks.com/)

Speaker's BIO: Russell Rice is VP Products at CloudPost and he brings over 20 years of experience in the network security industry. Russell has held senior leadership roles in product management, technical marketing, and engineering in startups and established companies spanning Cisco, Skyport Systems, Global Internet, and Dow Jones. At Cisco, Russell was the executive business leader for network access control (NAC), policy, and remote access products. Russell is an accomplished speaker and his teams were responsible for the Cisco SAFE network security guidelines. He graduated from UC Berkeley with a bachelor's degree in computer science.

Topic: Practical Considerations to Securing Business IoT

"Reported data breaches in 2016 came to a total of 4,149 breaches,
with 4.2 billion records exposed."

The question is, do you know what's inside your network and how to quickly isolate it from threats?

The following are some of the gaps that have lead to the IoT's meteoric rise in overall risk and identified control gap findings in recent years.

Gap 1: IoT Devices Must be Isolated: To protect an IoT device, the best approach is to isolate it. Allow it to communicate only with other systems designed to complete its mission. 
Gap 2: Quarantine is not an Option for Critical IoT: Hospitals cannot shut-down critical care equipment. Video cameras vulnerable to Mirai cannot be taken offline or easily replaced. Elevators are not casually turned off. These are all examples of IoT devices where service continuity is more important than cyber security, and unfortunately NAC doesn’t help protect them since the paradigm “quarantine if there’s a problem” doesn’t apply.
Gap 3: Threat Monitoring is Key, NAC Compliance is Not
Gap 4: Do Not Mis-Classify IoT Devices as Workstations
Gap 5: Protect Against IoT Spoofing: 
Advanced systems support certificates or some other form of advanced authentication. Unfortunately, most IoT devices do not support advanced authentication, and therefore are relatively easy to spoof.


Suggested reading: 

IoT Security: Top 5 Reasons Why NAC Falls Short



IoT Security: Top 5 Tasks Requiring Automation


Friday, January 19, 2018 - 11:30am to 1:00pm