I have the honour of having two cyber security experts on the show today.
Dr Jonathan Butts is a retired Air Force officer who among many other roles served as Research Director at the Air Force Center for Cyberspace Research.
Billy Rios has held security positions with companies like Ernst & Young, Verisign and Microsoft. He probably had one of the coolest sounding job titles as Google’s Security Ninja.
Both Jonathan and Billy are currently Managing Partners at QED Secure Solutions, whose mission it is to advance Cyber Security and Critical Infrastructure Protection.
Highlights From This Episode
- Anyone can purchase hardware or software and spend as much time as they can afford learning how it works
- There are three layers of security, The Vendor, The Systems Integrator and The Technology Owner
- All three parties need to work together to create a secure solution – it is a team game
- One defensive strategy is identifying critical systems and segmenting them from other systems
- The biggest security weaknesses are usually in the system configuration
- Security exploits can include Terrorist Threats, Public Safety, Critical Data Breaches and Unauthorized Usage of Computing Cycles
- The public safety aspect of the IoT may spur some regulations for security requirements
- Using a third party IoT platform does not shift risk away from stakeholders
- Raising awareness among Management and Leadership Stakeholders is the best way to make security a priority
Mentioned In This Episode
QED Secure Solutions, IBM, War Games, Microsoft, Google, Sochi Winter Games, Crestron, Defcon, BlackHat Conference, Department Of Homeland Security, Microsoft IoT, Amazon IoT, Ubuntu Core