Loading…
Welcome to the Interactive Agenda for SecurityWeek’s 2018 ICS Cyber Security Conference! (View the full conference website here)  (You can Register for ICS Cyber Security Conference Here
View analytic
Wednesday, October 24 • 1:30pm - 2:15pm
Inside the Mind of a Hacker / Security of Digital Twins

Sign up or log in to save this to your schedule and see who's attending!

Many organizations are failing to learn about what they’re up against. Current business models rely on connectivity and IoT services to meet growing consumer demands for flexibility, ease of access and convenience. However, this connectivity introduces more vulnerabilities from more third-party sources. Hackers exploit these vulnerabilities to bypass any safeguards in place and gain entry into an organization’s infrastructure. As a result, this “check box” security approach that many company’s take today simply isn’t effective.  Without knowing what you’re up against, an organization’s approach to cybersecurity is destined to fail. By knowing how a hacker operates, organizations are more prepared to address cybersecurity challenges head-on by implementing the proper safeguards to ensure that sensitive information, including an organization’s IP and customer data remains secure.
 
Digital Twins: The Answer to the IoT Security Conundrum?
 
According to Deloitte, a digital twin can be defined as “an evolving digital profile of the historical and current behavior of a physical object or process that helps optimize business performance.” A virtual way to inform maintenance on physical equipment and run complex what-if analyses, digital twins are already becoming a key part in the manufacturing industry and could have great potential for security in IoT and connected spaces.

Digital twins are supposed to be as accurate a representation of a real system as possible and, as such, a compelling IoT security use case could be hacker prototyping. For example, a hacker who gains access to a digital twin and disassembles the code can then use this information to identify attack points of the actual system. If the real system includes hardware security built in, these components may be replaced with a software library in the twin. In this way, a digital twin can be used to detect, localize, and neutralize security and performance threats to an IoT asset, as well as optimizing use of critical resources such as bandwidth.

In this session, Mark Hearn and Dave Belt will explore how hackers operate, what they are after and how they gain access despite security measures that are already in place. Digital Twins will then be explored as a specific use case that are a ripe target for these hackers’ techniques, painting an end to end picture of a hackers motivations and methods.

In this session we will discuss use-cases where digital twins can play a role in the security of connected systems, including hacker prototyping, IP protection and protecting against backend system attacks. The presentation will also discuss the wider potential for digital twins in the future security of the IoT and connected environments.

Speakers
avatar for Dave Belt

Dave Belt

Technology Evangelist, Irdeto
Dave currently serves as Product Marketing Director for Irdeto where he is defining the next generation of content security solutions. Dave Belt has been a specialist in cryptography and content protection technologies for the past 20 years. With a strong foundation in the Intelligence... Read More →
avatar for Mark Hearn

Mark Hearn

Director of IoT Security, Irdeto
Mark Hearn is the Director of IoT Security at Irdeto. He is responsible for leading Business Development strategies to secure organization’s IoT applications and connected devices. Mark has been with Irdeto since 2003, through Irdeto’s acquisition of Cloakware. Mark is a seasoned... Read More →


Wednesday October 24, 2018 1:30pm - 2:15pm
TBA