SlideShare a Scribd company logo
1 of 77
Download to read offline
2015	
  EuroCACS	
  /	
  ISRM	
  -­‐	
  Session	
  221	
  :	
  Practical	
  Advantages	
  of	
  Applying	
  Privacy	
  by	
  Design	
  in	
  Internet	
  of	
  Everything	
  (Marc	
  Vael)
Practical advantages of applying
Privacy by Design in IoE
Marc Vael
CISA, CISM, CISSP, CGEIT, CRISC, Guberna Certified Director
President of ISACA Belgium vzw
Chief Audit Executive of Smals vzw
Tuesday	
  10th	
  of	
  November	
  2015
2015	
  #EuroCACS	
  @marcvael
Agenda
Privacy	
  by	
  Design	
  
Internet	
  of	
  Everything	
  
Applying	
  PbD	
  in	
  IoE	
  
Advantages	
  of	
  applying	
  PbD	
  in	
  IoE
2015	
  #EuroCACS	
  @marcvael
Privacy
2015	
  #EuroCACS	
  @marcvael
Privacy
10	
  core	
  privacy	
  principles	
  
1.	
  Free	
  and	
  specific	
  consent	
  	
  
2.	
  Documented	
  and	
  communicated	
  accountability	
  
3.	
  Specified	
  and	
  communicated	
  purposes	
  for	
  collection,	
  use,	
  
retention	
  and	
  disclosure	
  	
  
4.	
  Fair,	
  lawful	
  and	
  limited	
  collection	
  
5.	
  Use,	
  Retention	
  and	
  Disclosure	
  limitation	
  
6.	
  Accuracy,	
  completeness	
  and	
  up-­‐to-­‐date	
  	
  
7.	
  Security	
  throughout	
  the	
  complete	
  information	
  lifecycle	
  
8.	
  Openness	
  and	
  transparency	
  to	
  individuals	
  
9.	
  Providing	
  access	
  to	
  personal	
  information	
  upon	
  request	
  	
  
10.	
  Monitor,	
  evaluate	
  and	
  verify	
  privacy	
  compliance
2015	
  #EuroCACS	
  @marcvael
Privacy by Design
7	
  core	
  PbD	
  principles	
  
1.	
  Proactive	
  not	
  Reactive	
  :	
  Preventative	
  not	
  Remedial.	
  	
  
2.	
  Privacy	
  as	
  the	
  Default	
  Setting.	
  
3.	
  Privacy	
  Embedded	
  into	
  Design.	
  	
  	
  
4.	
  Full	
  Functionality	
  :	
  Positive-­‐Sum,	
  not	
  Zero-­‐Sum.	
  
5.	
  End-­‐to-­‐End	
  Security	
  :	
  Full	
  Life	
  Cycle	
  Protection.	
  
6.	
  Visibility	
  and	
  Transparency	
  :	
  Keep	
  it	
  open.	
  
7.	
  Respect	
  for	
  User	
  Privacy	
  :	
  Keep	
  it	
  individual	
  and	
  user-­‐
centric.	
  


Ann	
  Cavoukian,	
  Ph.D.,	
  Information	
  &	
  Privacy	
  Commissioner	
  Ontario,	
  Canada	
  

https://privacybydesign.ca/content/uploads/2011/11/PbD-­‐PIA-­‐Foundational-­‐Framework.pdf	
  
2015	
  #EuroCACS	
  @marcvael
Main benefits of PbD
1. Increased awareness of privacy and data
protection across an organisation.
2. Actions take privacy into account and
generate a positive impact on individuals.
3. Potential privacy problems are identified at
an early stage; addressing them early will
often be simpler and less costly.
4. Organisations are more likely to meet their
legal obligations and thus less likely to
breach privacy laws and regulations.
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
Agenda
Privacy	
  by	
  Design	
  
Internet	
  of	
  Everything	
  
Applying	
  PbD	
  in	
  IoE	
  
Advantages	
  of	
  applying	
  PbD	
  in	
  IoE
2015	
  #EuroCACS	
  @marcvael
@Kevin_Ashton
2015	
  #EuroCACS	
  @marcvael
Definition of IoT
“The	
  Internet	
  of	
  Things,	
  or	
  IoT,	
  

is	
  not	
  a	
  second	
  Internet.	
  	
  
Rather,	
  it	
  is	
  a	
  network	
  of	
  items

—each	
  embedded	
  with	
  sensors—

which	
  are	
  connected	
  to	
  the	
  Internet.”

IEEE
2015	
  #EuroCACS	
  @marcvael
Definition of IoT
“The	
  Internet	
  of	
  Things	
  (IoT)	
  is	
  the	
  network	
  of	
  physical	
  objects	
  or	
  
"things"	
  embedded	
  with	
  electronics,	
  software,	
  sensors,	
  and	
  
network	
  connectivity,	
  which	
  enables	
  these	
  objects	
  to	
  collect	
  and	
  
exchange	
  data.	
  The	
  Internet	
  of	
  Things	
  allows	
  objects	
  to	
  be	
  sensed	
  
and	
  controlled	
  remotely	
  across	
  existing	
  network	
  infrastructure,	
  
creating	
  opportunities	
  for	
  more	
  direct	
  integration	
  between	
  the	
  
physical	
  world	
  and	
  computer-­‐based	
  systems,	
  and	
  resulting	
  in	
  
improved	
  efficiency,	
  accuracy	
  and	
  economic	
  benefit.	
  
Each	
  thing	
  is	
  
uniquely	
  identifiable	
  through	
  its	
  embedded	
  computing	
  system	
  but	
  
is	
  able	
  to	
  interoperate	
  within	
  the	
  existing	
  Internet	
  infrastructure.”



https://en.wikipedia.org/wiki/Internet_of_Things	
  
2015	
  #EuroCACS	
  @marcvael
Current	
  status
https://en.wikipedia.org/wiki/List_of_countries_by_IoT_devices_online	
  
Countries with IoT devices online per 100 inhabitants as published by the OECD in 2015
8
4
2015	
  #EuroCACS	
  @marcvael
Definition of IoE
“The	
  Internet	
  of	
  Everything	
  (IoE)	
  	
  
is	
  a	
  scenario	
  in	
  which	
  objects,	
  animals	
  or	
  people	
  are	
  
provided	
  with	
  unique	
  smart	
  identifiers	
  and	
  the	
  ability	
  
to	
  transfer	
  data	
  over	
  a	
  network	
  without	
  requiring	
  

human-­‐to-­‐human	
  or	
  human-­‐to-­‐computer	
  interaction.”

TechTarget
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
How will IoE change the world?
2015	
  #EuroCACS	
  @marcvael
Most IoE devices will be B2B
Source: McKinsey Global Institute, Intel infographic
2015	
  #EuroCACS	
  @marcvael
Most IoE devices will be B2B
2015	
  #EuroCACS	
  @marcvael
Potential benefits of IoE
Source: BI Intelligence, Cisco 7000+ global executives
2015	
  #EuroCACS	
  @marcvael
Potential benefits of IoE
Source: BI Intelligence, Cisco 7000+ global executives
• IoE	
  devices	
  capture	
  and	
  produce	
  valuable	
  data	
  
• IoE	
  data	
  is	
  very	
  interesting	
  and	
  beneficial	
  
• Improve	
  service	
  (maintenance	
  on	
  time)	
  
• Improve	
  personalisation	
  
• Address	
  real-­‐time	
  needs,	
  threats	
  and	
  opportunities	
  
• Improve	
  forecasting	
  and	
  capacity	
  
• Optimize	
  production,	
  delivery,	
  availability	
  and	
  utilization	
  
• IoE	
  data	
  can	
  contain	
  very	
  sensitive	
  information	
  
• Storing	
  IoE	
  data	
  is	
  easy	
  and	
  cheap
2015	
  #EuroCACS	
  @marcvael
14,4	
  trillion	
  USD	
  by	
  2022
Source: Cisco
2015	
  #EuroCACS	
  @marcvael
Source: NIST
2015	
  #EuroCACS	
  @marcvael
Source: NIST
2015	
  #EuroCACS	
  @marcvael
Source: IBM
2015	
  #EuroCACS	
  @marcvael
IoE	
  blueprint	
  architecture
IoE	
  Applications
Identity,	
  
access	
  and	
  
security	
  
tools
Rules/Analytics	
  Engine
Application	
  Platform
Product	
  Data	
  Database
Product	
  Hardware
Product	
  Software
Network	
  Communication
Integration	
  
with	
  
core	
  
Business	
  
Systems	
  
(ERP,	
  CRM,	
  
HRM,…)
External	
  
information	
  
sources	
  
(weather,	
  
traffic,	
  
energy	
  
prices,	
  
social	
  
media,	
  geo-­‐
mapping…)
2015	
  #EuroCACS	
  @marcvael
IoE Standards?
2015	
  #EuroCACS	
  @marcvael
IoE Standards?
2015	
  #EuroCACS	
  @marcvael
IoE Standards?
2015	
  #EuroCACS	
  @marcvael
IoE Standards?
2015	
  #EuroCACS	
  @marcvael
IoE Standards?
2015	
  #EuroCACS	
  @marcvael
IoE Standards?
2015	
  #EuroCACS	
  @marcvael
IoE Standards?
2015	
  #EuroCACS	
  @marcvael
IoE Standards?
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
Potential challenges of IoE
Source: Internet of Things Consortium
• Business	
  challenges	
  
• Enabling	
  customer	
  privacy	
  and	
  property	
  rights	
  
• Health	
  and	
  safety	
  compliance	
  
• Unexpected	
  costs	
  
• Meeting	
  customer	
  needs	
  and	
  expectations	
  
• Operational	
  challenges	
  
• Authentication	
  and	
  authorization	
  issues	
  
• BYOx	
  
• Complete	
  process	
  chain	
  performance	
  
• Technical	
  challenges	
  
• Requiring	
  new	
  IT	
  infrastructure	
  stack	
  
• Over	
  reliance	
  on	
  technology	
  
• Maintaining/Updating	
  devices	
  
• Managing	
  vast	
  amounts	
  of	
  data
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
So	
  what	
  does	
  IoE	
  means	
  for	
  privacy?
The	
  main	
  IoE	
  risk	
  is	
  
underestimating	
  
security	
  &	
  privacy	
  
risks!
2015	
  #EuroCACS	
  @marcvael
“In essence, you've got a computer inside
some device, whether it be a printer, a TV,
a toaster, the Coke machine, etc., and
that computer is just as vulnerable to
attacks as a normal computer would be.”
Dan Frye, general manager MAD security
2015	
  #EuroCACS	
  @marcvael
Privacy	
  concerns	
  on	
  IoE
Consumer	
  perspecQve	
  of	
  disclosing	
  personal	
  info	
  to	
  IoE
POTENTIAL	
  BENEFITS POTENTIAL	
  COSTS
Convenience	
  
Service	
  (information,	
  
transaction,	
  entertainment)	
  
Customization	
  /	
  
Personalization	
  
Lower	
  search	
  costs	
  
Attention	
  
Relationship	
  management	
  
Psychological	
  well	
  being	
  	
  	
  
Increasing	
  complexity	
  
Referral	
  permission	
  
Higher	
  prices	
  
Time	
  consuming	
  
Spam	
  
Attention	
  
Reputation	
  management	
  
Psychological	
  distress
2015	
  #EuroCACS	
  @marcvael
Privacy	
  concerns	
  on	
  IoE
OrganizaQon	
  perspecQve	
  of	
  using	
  IoE	
  consumer	
  info
POTENTIAL	
  BENEFITS POTENTIAL	
  COSTS
Efficient	
  and	
  effective	
  strategy	
  
development	
  
Effective	
  resource	
  allocation	
  
and	
  operational	
  practices	
  
Increased	
  number	
  of	
  target	
  
touch	
  points	
  
Customer	
  loyalty	
  
management	
  
Additional	
  revenue	
  streams	
  
Upfront	
  investment	
  in	
  top	
  IT	
  
and	
  top	
  security	
  (24/7)	
  
Marketing	
  research	
  costs	
  
Business	
  Intelligence	
  and	
  
datawarehouse	
  costs	
  
Personalisation	
  costs	
  
Reputation	
  management	
  
Legal	
  compliance	
  costs
2015	
  #EuroCACS	
  @marcvael
Privacy	
  concerns	
  on	
  IoE
• IoE	
  introduces	
  new	
  ways	
  of	
  collecting	
  and	
  
processing	
  massive	
  amounts	
  of	
  information	
  from	
  
“everything”	
  
• correlation	
  &	
  association	
  =>	
  abuse	
  potential	
  
• IoE	
  devices	
  can	
  reveal	
  sensitive	
  information	
  about	
  
the	
  individual	
  (like	
  purchasing	
  patterns,	
  driving	
  
habits,	
  access	
  codes,	
  locations,	
  …)	
  
• Who	
  can	
  access	
  this	
  IoE	
  data?	
  
• How	
  should	
  this	
  IoE	
  data	
  be	
  protected?
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
+/- 70 data capture systems
+/- 100 million lines of code
Is it really okay that I’m letting 

a commercial company 

collect information 

about how, where and when I drive?
2015	
  #EuroCACS	
  @marcvael
Is it really okay that I’m letting 

a commercial company 

collect information 

about when I am home or not?
2015	
  #EuroCACS	
  @marcvael
Is it really okay that I’m letting 

a commercial company 

collect information 

about my workouts and my heart rate?
2015	
  #EuroCACS	
  @marcvael
Is it really okay that I’m letting 

a commercial company 

collect information 

about how, where and when I have sex?
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
Do you have the right to know
what companies are
collecting your info and 

how they are using your info?
2015	
  #EuroCACS	
  @marcvael
http://hd.media.mit.edu/wef_globalit.pdf	
  
2015	
  #EuroCACS	
  @marcvael
http://hd.media.mit.edu/wef_globalit.pdf	
  
The New Deal on Data
The first step is to give people ownership of their data.

“own your own data” = Old English Common Law has 3 basic
tenets of ownership:
1. The right of possession: You have a right to possess your data.
Companies should adopt the role of a Swiss bank account for
your data.You open an account (anonymously, if possible), and
you can remove your data whenever you’d like.
2. The right of use: You, the data owner, must have full control
over the use of your data. If you’re not happy with the way a
company uses your data, you can remove it. All of it. Everything
must be opt-in, and not only clearly explained in plain language,
but with regular reminders that you have the option to opt out.
3. The right of disposal: You have a right to dispose or distribute
your data. If you want to destroy it or remove it and redeploy it
elsewhere, it is your call.
2015	
  #EuroCACS	
  @marcvael
http://hd.media.mit.edu/wef_globalit.pdf	
  
The New Deal on Data
+ ONE EXTRA PRINCIPLE
4. The right of anonymously sharing: You have the right to
share massive amounts of your data anonymously to promote
the common good, since aggregate and anonymous data
can dramatically improve society. Patterns of how people
move around can be used for early identification of infectious
disease outbreaks, protection of the environment and public
safety. It can also help measure the effectiveness of various
government programs and improve the transparency and
accountability of government and non-profit organizations.
2015	
  #EuroCACS	
  @marcvael
Agenda
Privacy	
  by	
  Design	
  
Internet	
  of	
  Everything	
  
Applying	
  PbD	
  in	
  IoE	
  
Advantages	
  of	
  applying	
  PbD	
  in	
  IoE
2015	
  #EuroCACS	
  @marcvael
Applying	
  Privacy	
  by	
  Design	
  in	
  IoE
1)	
  Integrate	
  IoE	
  data	
  quality	
  as	
  a	
  design	
  
discipline	
  in	
  all	
  processes	
  
• Ask	
  what	
  data	
  really	
  need	
  to	
  be	
  captured,	
  and	
  what	
  data	
  
really	
  need	
  to	
  be	
  stored	
  vs.	
  what	
  can	
  be	
  processed	
  in	
  
real	
  time	
  without	
  storing.	
  
• Aim	
  to	
  store	
  data	
  showing	
  a	
  consumer	
  action	
  separately	
  
from	
  data	
  showing	
  what	
  triggered	
  that	
  action	
  or	
  the	
  
actual	
  consumer	
  behaviour.	
  
• Preemptively	
  outline	
  data	
  risks	
  and	
  intended	
  course	
  of	
  
action	
  in	
  the	
  event	
  of	
  crisis.
2015	
  #EuroCACS	
  @marcvael
2)	
  Evolve	
  from	
  complex	
  legal	
  fine	
  print	
  
to	
  transparent	
  IoE	
  disclosures	
  
• Disclose	
  all	
  intended	
  and	
  potential	
  future	
  uses	
  of	
  
consumer	
  data	
  in	
  simple	
  language	
  at	
  the	
  point	
  of	
  data	
  
collection.	
  
• Incorporate	
  store/do	
  not	
  store	
  and	
  use/do	
  not	
  use	
  
checkbox	
  options	
  on	
  forms	
  next	
  to	
  sensitive	
  data	
  fields.	
  
• Offer	
  and	
  train	
  live	
  chat	
  experts	
  to	
  answer	
  privacy	
  
questions	
  (not	
  just	
  product/service	
  questions)	
  directly.
Applying	
  Privacy	
  by	
  Design	
  in	
  IoE
2015	
  #EuroCACS	
  @marcvael
3)	
  Make	
  privacy	
  a	
  positive	
  part	
  of	
  the	
  
IoE	
  brand	
  experience	
  
• Formalize	
  robust	
  preference	
  centers	
  as	
  a	
  new	
  user	
  
experience	
  best	
  practice,	
  including	
  options	
  to	
  receive	
  (or	
  
not	
  receive)	
  content	
  customized	
  to	
  location,	
  interests	
  
and	
  purchase	
  history.	
  
• Make	
  privacy	
  decision	
  points	
  more	
  bite-­‐size	
  and	
  
contextual.	
  
• Have	
  the	
  system	
  reviewed	
  by	
  specialist	
  data	
  auditors	
  
Applying	
  Privacy	
  by	
  Design	
  in	
  IoE
2015	
  #EuroCACS	
  @marcvael
“COBIT5 for privacy”
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
Applying	
  Privacy	
  by	
  Design	
  in	
  IoE
2015	
  #EuroCACS	
  @marcvael
Source: www.opensecurityarchitecture.org
Applying Privacy by Design in IoE
2015	
  #EuroCACS	
  @marcvael
Applying Privacy by Design in IoE
2015	
  #EuroCACS	
  @marcvael
Agenda
Privacy	
  by	
  Design	
  
Internet	
  of	
  Everything	
  
Applying	
  PbD	
  in	
  IoE	
  
Advantages	
  of	
  applying	
  PbD	
  in	
  IoE
2015	
  #EuroCACS	
  @marcvael
In	
  short,	
  EVERYBODY	
  WINS	
  	
  
Protecting	
  consumers	
  and	
  brand	
  integrity	
  
and	
  building	
  consumer	
  confidence	
  whilst	
  
delivering	
  on	
  efficiency,	
  effectiveness,	
  
bottom	
  line	
  and	
  increasing	
  customer	
  
experience	
  and	
  loyalty.	
  	
  	
  
Practical	
  advantages	
  of	
  applying	
  

Privacy	
  by	
  Design	
  in	
  IoE	
  
2015	
  #EuroCACS	
  @marcvael
In	
  short,	
  EVERYBODY	
  WINS	
  	
  
The	
  new	
  data	
  economy	
  will	
  be	
  healthier	
  
if	
  the	
  relationship	
  between	
  companies	
  
and	
  consumers	
  is	
  more	
  respectful	
  and	
  
balanced.	
  	
  That	
  is	
  much	
  more	
  sustainable	
  
and	
  will	
  prevent	
  real	
  life	
  disasters.	
  
Practical	
  advantages	
  of	
  applying	
  

Privacy	
  by	
  Design	
  in	
  IoE	
  
2015	
  #EuroCACS	
  @marcvael
In	
  short,	
  EVERYBODY	
  WINS	
  	
  
The	
  new	
  data	
  economy	
  will	
  bring	
  first	
  
greater	
  stability	
  and	
  then	
  eventually	
  
greater	
  profitability	
  as	
  people	
  become	
  
more	
  comfortable	
  sharing	
  their	
  own	
  
data.	
  
Practical	
  advantages	
  of	
  applying	
  

Privacy	
  by	
  Design	
  in	
  IoE	
  
2015	
  #EuroCACS	
  @marcvael
By	
  adopting	
  a	
  sound	
  transparent	
  

privacy-­‐by-­‐design	
  approach	
  from	
  the	
  start,	
  

IoE	
  solution	
  providers	
  can	
  transform	
  

their	
  innovative	
  ideas	
  into	
  good	
  practices	
  

that	
  provide	
  long-­‐term	
  trust	
  and	
  value	
  for	
  

both	
  IoE	
  users	
  and	
  themselves.
Practical	
  advantages	
  of	
  applying	
  

Privacy	
  by	
  Design	
  in	
  IoE	
  
2015	
  #EuroCACS	
  @marcvael
Practical	
  advantages	
  of	
  applying	
  

Privacy	
  by	
  Design	
  in	
  IoE
Trust	
  in,	
  and	
  value	
  from,	
  

IoE	
  solutions
“If you think technology
can solve your security
problems, then you don't
understand the problems
and you don't understand
the technology.”
Bruce Schneier, 

Security Technologist (www.schneier.com)
2015	
  #EuroCACS	
  @marcvael
So who is going to hold 

the complete overview of your life?
2015	
  #EuroCACS	
  @marcvael
2015	
  #EuroCACS	
  @marcvael
You	
  want	
  to	
  know	
  more?
Mireille Hildebrandt, Professor of Smart
Environments, Data Protection and the Rule
of Law at Radboud University Nijmegen,
studies how constitutional governments
function in cyberspace. It’s a very necessary
study: on the internet, but also in other
digital contexts, our behaviour is continually
monitored and communicated. That's a
breach of our civil rights.
2015	
  #EuroCACS	
  @marcvael
almost 1000 guests from 43 different Countries
Gender balance: 57% men – 43% women presence
More than 60 panels, workshops and special sessions
http://www.cpdpconferences.org
You	
  want	
  to	
  know	
  more?
2015	
  #EuroCACS	
  @marcvael
http://www.cpdpconferences.org	
  
You	
  want	
  to	
  know	
  more?
2015	
  #EuroCACS	
  @marcvael
You	
  want	
  to	
  know	
  more?
http://iotinternetofthingsconference.com
2015	
  #EuroCACS	
  @marcvael
Contact details
Mr. Marc Vael
President
ISACA BELGIUM vzw
Koningsstraat 109 box 5
1000 Brussel
Belgium
www.isaca.be
www.isaca.org
president@isaca.be
marc@vael.net
http://www.linkedin.com/in/marcvael
@marcvael

More Related Content

What's hot

Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Mind the Byte
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
John Pinson
 

What's hot (19)

Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, MicrosoftProgress towards security in the Cloud-Héctor Sánchez, Microsoft
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
APrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of ThingsAPrIGF 2015: Security and the Internet of Things
APrIGF 2015: Security and the Internet of Things
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach
 
How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...How privacy by design can be the key of your success at the time of the digit...
How privacy by design can be the key of your success at the time of the digit...
 
Cert Overview
Cert OverviewCert Overview
Cert Overview
 

Viewers also liked

Top career課件
Top career課件Top career課件
Top career課件
Qilian
 

Viewers also liked (18)

Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 
20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN
 
Safeguarding privacy in research design
Safeguarding privacy in research designSafeguarding privacy in research design
Safeguarding privacy in research design
 
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
Google在被遺忘權 (Right to Be Forgotten)中所扮演的角色
 
Top career課件
Top career課件Top career課件
Top career課件
 
Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)
 
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
Security, Risk, Compliance & Controls - Cybersecurity Legal Framework in Hong...
 
Don't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By DesignDon't Ask, Don't Tell - The Virtues of Privacy By Design
Don't Ask, Don't Tell - The Virtues of Privacy By Design
 
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
#Ready4EUdataP Privacy by Design: effetti pratici sui sistemi IT Giancarlo Butti
 
Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World Managing Cloud Security Design and Implementation in a Ransomware World
Managing Cloud Security Design and Implementation in a Ransomware World
 
Ame Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for PrivacyAme Elliott – No, Thank You: User Experience Design for Privacy
Ame Elliott – No, Thank You: User Experience Design for Privacy
 
Data Pipeline Matters
Data Pipeline MattersData Pipeline Matters
Data Pipeline Matters
 
The AI Rush
The AI RushThe AI Rush
The AI Rush
 

Similar to Advantages of privacy by design in IoE

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
bmcmenemy
 
IoT Business Transformation_publish
IoT Business Transformation_publishIoT Business Transformation_publish
IoT Business Transformation_publish
Aneet Chopra
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
Jorge Rivero Sanchez
 
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - splitCisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Son Phan
 

Similar to Advantages of privacy by design in IoE (20)

The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
IoT Business Transformation_publish
IoT Business Transformation_publishIoT Business Transformation_publish
IoT Business Transformation_publish
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Wireless Global Congress: 2020 is not that far away
Wireless Global Congress:  2020 is not that far awayWireless Global Congress:  2020 is not that far away
Wireless Global Congress: 2020 is not that far away
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Kijiji 160616
Kijiji 160616Kijiji 160616
Kijiji 160616
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Cisco io t for vietnam cio community 2 apr 2015 - split
Cisco io t for vietnam cio community   2 apr 2015 - splitCisco io t for vietnam cio community   2 apr 2015 - split
Cisco io t for vietnam cio community 2 apr 2015 - split
 
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - splitCisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
Cisco IoT for Vietnam CIO Community - 2 Apr 2015 - split
 

More from Marc Vael

CobIT presentation
CobIT presentationCobIT presentation
CobIT presentation
Marc Vael
 

More from Marc Vael (20)

my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentation
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security today
 
ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011
 
Valuendo cyberwar and security (okt 2011) handout
Valuendo cyberwar and security (okt 2011) handoutValuendo cyberwar and security (okt 2011) handout
Valuendo cyberwar and security (okt 2011) handout
 
Isaca india trust & value from cloud computing (aug 2011) print
Isaca india trust & value from cloud computing (aug 2011) printIsaca india trust & value from cloud computing (aug 2011) print
Isaca india trust & value from cloud computing (aug 2011) print
 
CobIT presentation
CobIT presentationCobIT presentation
CobIT presentation
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Advantages of privacy by design in IoE

  • 1. 2015  EuroCACS  /  ISRM  -­‐  Session  221  :  Practical  Advantages  of  Applying  Privacy  by  Design  in  Internet  of  Everything  (Marc  Vael) Practical advantages of applying Privacy by Design in IoE Marc Vael CISA, CISM, CISSP, CGEIT, CRISC, Guberna Certified Director President of ISACA Belgium vzw Chief Audit Executive of Smals vzw Tuesday  10th  of  November  2015
  • 2. 2015  #EuroCACS  @marcvael Agenda Privacy  by  Design   Internet  of  Everything   Applying  PbD  in  IoE   Advantages  of  applying  PbD  in  IoE
  • 4. 2015  #EuroCACS  @marcvael Privacy 10  core  privacy  principles   1.  Free  and  specific  consent     2.  Documented  and  communicated  accountability   3.  Specified  and  communicated  purposes  for  collection,  use,   retention  and  disclosure     4.  Fair,  lawful  and  limited  collection   5.  Use,  Retention  and  Disclosure  limitation   6.  Accuracy,  completeness  and  up-­‐to-­‐date     7.  Security  throughout  the  complete  information  lifecycle   8.  Openness  and  transparency  to  individuals   9.  Providing  access  to  personal  information  upon  request     10.  Monitor,  evaluate  and  verify  privacy  compliance
  • 5. 2015  #EuroCACS  @marcvael Privacy by Design 7  core  PbD  principles   1.  Proactive  not  Reactive  :  Preventative  not  Remedial.     2.  Privacy  as  the  Default  Setting.   3.  Privacy  Embedded  into  Design.       4.  Full  Functionality  :  Positive-­‐Sum,  not  Zero-­‐Sum.   5.  End-­‐to-­‐End  Security  :  Full  Life  Cycle  Protection.   6.  Visibility  and  Transparency  :  Keep  it  open.   7.  Respect  for  User  Privacy  :  Keep  it  individual  and  user-­‐ centric.   
 Ann  Cavoukian,  Ph.D.,  Information  &  Privacy  Commissioner  Ontario,  Canada  
 https://privacybydesign.ca/content/uploads/2011/11/PbD-­‐PIA-­‐Foundational-­‐Framework.pdf  
  • 6. 2015  #EuroCACS  @marcvael Main benefits of PbD 1. Increased awareness of privacy and data protection across an organisation. 2. Actions take privacy into account and generate a positive impact on individuals. 3. Potential privacy problems are identified at an early stage; addressing them early will often be simpler and less costly. 4. Organisations are more likely to meet their legal obligations and thus less likely to breach privacy laws and regulations.
  • 9. 2015  #EuroCACS  @marcvael Agenda Privacy  by  Design   Internet  of  Everything   Applying  PbD  in  IoE   Advantages  of  applying  PbD  in  IoE
  • 11. 2015  #EuroCACS  @marcvael Definition of IoT “The  Internet  of  Things,  or  IoT,  
 is  not  a  second  Internet.     Rather,  it  is  a  network  of  items
 —each  embedded  with  sensors—
 which  are  connected  to  the  Internet.”
 IEEE
  • 12. 2015  #EuroCACS  @marcvael Definition of IoT “The  Internet  of  Things  (IoT)  is  the  network  of  physical  objects  or   "things"  embedded  with  electronics,  software,  sensors,  and   network  connectivity,  which  enables  these  objects  to  collect  and   exchange  data.  The  Internet  of  Things  allows  objects  to  be  sensed   and  controlled  remotely  across  existing  network  infrastructure,   creating  opportunities  for  more  direct  integration  between  the   physical  world  and  computer-­‐based  systems,  and  resulting  in   improved  efficiency,  accuracy  and  economic  benefit.   Each  thing  is   uniquely  identifiable  through  its  embedded  computing  system  but   is  able  to  interoperate  within  the  existing  Internet  infrastructure.”
 
 https://en.wikipedia.org/wiki/Internet_of_Things  
  • 13. 2015  #EuroCACS  @marcvael Current  status https://en.wikipedia.org/wiki/List_of_countries_by_IoT_devices_online   Countries with IoT devices online per 100 inhabitants as published by the OECD in 2015 8 4
  • 14. 2015  #EuroCACS  @marcvael Definition of IoE “The  Internet  of  Everything  (IoE)     is  a  scenario  in  which  objects,  animals  or  people  are   provided  with  unique  smart  identifiers  and  the  ability   to  transfer  data  over  a  network  without  requiring  
 human-­‐to-­‐human  or  human-­‐to-­‐computer  interaction.”
 TechTarget
  • 17. 2015  #EuroCACS  @marcvael How will IoE change the world?
  • 18. 2015  #EuroCACS  @marcvael Most IoE devices will be B2B Source: McKinsey Global Institute, Intel infographic
  • 19. 2015  #EuroCACS  @marcvael Most IoE devices will be B2B
  • 20. 2015  #EuroCACS  @marcvael Potential benefits of IoE Source: BI Intelligence, Cisco 7000+ global executives
  • 21. 2015  #EuroCACS  @marcvael Potential benefits of IoE Source: BI Intelligence, Cisco 7000+ global executives • IoE  devices  capture  and  produce  valuable  data   • IoE  data  is  very  interesting  and  beneficial   • Improve  service  (maintenance  on  time)   • Improve  personalisation   • Address  real-­‐time  needs,  threats  and  opportunities   • Improve  forecasting  and  capacity   • Optimize  production,  delivery,  availability  and  utilization   • IoE  data  can  contain  very  sensitive  information   • Storing  IoE  data  is  easy  and  cheap
  • 22. 2015  #EuroCACS  @marcvael 14,4  trillion  USD  by  2022 Source: Cisco
  • 26. 2015  #EuroCACS  @marcvael IoE  blueprint  architecture IoE  Applications Identity,   access  and   security   tools Rules/Analytics  Engine Application  Platform Product  Data  Database Product  Hardware Product  Software Network  Communication Integration   with   core   Business   Systems   (ERP,  CRM,   HRM,…) External   information   sources   (weather,   traffic,   energy   prices,   social   media,  geo-­‐ mapping…)
  • 36. 2015  #EuroCACS  @marcvael Potential challenges of IoE Source: Internet of Things Consortium • Business  challenges   • Enabling  customer  privacy  and  property  rights   • Health  and  safety  compliance   • Unexpected  costs   • Meeting  customer  needs  and  expectations   • Operational  challenges   • Authentication  and  authorization  issues   • BYOx   • Complete  process  chain  performance   • Technical  challenges   • Requiring  new  IT  infrastructure  stack   • Over  reliance  on  technology   • Maintaining/Updating  devices   • Managing  vast  amounts  of  data
  • 38. 2015  #EuroCACS  @marcvael So  what  does  IoE  means  for  privacy? The  main  IoE  risk  is   underestimating   security  &  privacy   risks!
  • 39. 2015  #EuroCACS  @marcvael “In essence, you've got a computer inside some device, whether it be a printer, a TV, a toaster, the Coke machine, etc., and that computer is just as vulnerable to attacks as a normal computer would be.” Dan Frye, general manager MAD security
  • 40. 2015  #EuroCACS  @marcvael Privacy  concerns  on  IoE Consumer  perspecQve  of  disclosing  personal  info  to  IoE POTENTIAL  BENEFITS POTENTIAL  COSTS Convenience   Service  (information,   transaction,  entertainment)   Customization  /   Personalization   Lower  search  costs   Attention   Relationship  management   Psychological  well  being       Increasing  complexity   Referral  permission   Higher  prices   Time  consuming   Spam   Attention   Reputation  management   Psychological  distress
  • 41. 2015  #EuroCACS  @marcvael Privacy  concerns  on  IoE OrganizaQon  perspecQve  of  using  IoE  consumer  info POTENTIAL  BENEFITS POTENTIAL  COSTS Efficient  and  effective  strategy   development   Effective  resource  allocation   and  operational  practices   Increased  number  of  target   touch  points   Customer  loyalty   management   Additional  revenue  streams   Upfront  investment  in  top  IT   and  top  security  (24/7)   Marketing  research  costs   Business  Intelligence  and   datawarehouse  costs   Personalisation  costs   Reputation  management   Legal  compliance  costs
  • 42. 2015  #EuroCACS  @marcvael Privacy  concerns  on  IoE • IoE  introduces  new  ways  of  collecting  and   processing  massive  amounts  of  information  from   “everything”   • correlation  &  association  =>  abuse  potential   • IoE  devices  can  reveal  sensitive  information  about   the  individual  (like  purchasing  patterns,  driving   habits,  access  codes,  locations,  …)   • Who  can  access  this  IoE  data?   • How  should  this  IoE  data  be  protected?
  • 44. 2015  #EuroCACS  @marcvael +/- 70 data capture systems +/- 100 million lines of code Is it really okay that I’m letting 
 a commercial company 
 collect information 
 about how, where and when I drive?
  • 45. 2015  #EuroCACS  @marcvael Is it really okay that I’m letting 
 a commercial company 
 collect information 
 about when I am home or not?
  • 46. 2015  #EuroCACS  @marcvael Is it really okay that I’m letting 
 a commercial company 
 collect information 
 about my workouts and my heart rate?
  • 47. 2015  #EuroCACS  @marcvael Is it really okay that I’m letting 
 a commercial company 
 collect information 
 about how, where and when I have sex?
  • 51. 2015  #EuroCACS  @marcvael Do you have the right to know what companies are collecting your info and 
 how they are using your info?
  • 53. 2015  #EuroCACS  @marcvael http://hd.media.mit.edu/wef_globalit.pdf   The New Deal on Data The first step is to give people ownership of their data.
 “own your own data” = Old English Common Law has 3 basic tenets of ownership: 1. The right of possession: You have a right to possess your data. Companies should adopt the role of a Swiss bank account for your data.You open an account (anonymously, if possible), and you can remove your data whenever you’d like. 2. The right of use: You, the data owner, must have full control over the use of your data. If you’re not happy with the way a company uses your data, you can remove it. All of it. Everything must be opt-in, and not only clearly explained in plain language, but with regular reminders that you have the option to opt out. 3. The right of disposal: You have a right to dispose or distribute your data. If you want to destroy it or remove it and redeploy it elsewhere, it is your call.
  • 54. 2015  #EuroCACS  @marcvael http://hd.media.mit.edu/wef_globalit.pdf   The New Deal on Data + ONE EXTRA PRINCIPLE 4. The right of anonymously sharing: You have the right to share massive amounts of your data anonymously to promote the common good, since aggregate and anonymous data can dramatically improve society. Patterns of how people move around can be used for early identification of infectious disease outbreaks, protection of the environment and public safety. It can also help measure the effectiveness of various government programs and improve the transparency and accountability of government and non-profit organizations.
  • 55. 2015  #EuroCACS  @marcvael Agenda Privacy  by  Design   Internet  of  Everything   Applying  PbD  in  IoE   Advantages  of  applying  PbD  in  IoE
  • 56. 2015  #EuroCACS  @marcvael Applying  Privacy  by  Design  in  IoE 1)  Integrate  IoE  data  quality  as  a  design   discipline  in  all  processes   • Ask  what  data  really  need  to  be  captured,  and  what  data   really  need  to  be  stored  vs.  what  can  be  processed  in   real  time  without  storing.   • Aim  to  store  data  showing  a  consumer  action  separately   from  data  showing  what  triggered  that  action  or  the   actual  consumer  behaviour.   • Preemptively  outline  data  risks  and  intended  course  of   action  in  the  event  of  crisis.
  • 57. 2015  #EuroCACS  @marcvael 2)  Evolve  from  complex  legal  fine  print   to  transparent  IoE  disclosures   • Disclose  all  intended  and  potential  future  uses  of   consumer  data  in  simple  language  at  the  point  of  data   collection.   • Incorporate  store/do  not  store  and  use/do  not  use   checkbox  options  on  forms  next  to  sensitive  data  fields.   • Offer  and  train  live  chat  experts  to  answer  privacy   questions  (not  just  product/service  questions)  directly. Applying  Privacy  by  Design  in  IoE
  • 58. 2015  #EuroCACS  @marcvael 3)  Make  privacy  a  positive  part  of  the   IoE  brand  experience   • Formalize  robust  preference  centers  as  a  new  user   experience  best  practice,  including  options  to  receive  (or   not  receive)  content  customized  to  location,  interests   and  purchase  history.   • Make  privacy  decision  points  more  bite-­‐size  and   contextual.   • Have  the  system  reviewed  by  specialist  data  auditors   Applying  Privacy  by  Design  in  IoE
  • 61. 2015  #EuroCACS  @marcvael Applying  Privacy  by  Design  in  IoE
  • 62. 2015  #EuroCACS  @marcvael Source: www.opensecurityarchitecture.org Applying Privacy by Design in IoE
  • 63. 2015  #EuroCACS  @marcvael Applying Privacy by Design in IoE
  • 64. 2015  #EuroCACS  @marcvael Agenda Privacy  by  Design   Internet  of  Everything   Applying  PbD  in  IoE   Advantages  of  applying  PbD  in  IoE
  • 65. 2015  #EuroCACS  @marcvael In  short,  EVERYBODY  WINS     Protecting  consumers  and  brand  integrity   and  building  consumer  confidence  whilst   delivering  on  efficiency,  effectiveness,   bottom  line  and  increasing  customer   experience  and  loyalty.       Practical  advantages  of  applying  
 Privacy  by  Design  in  IoE  
  • 66. 2015  #EuroCACS  @marcvael In  short,  EVERYBODY  WINS     The  new  data  economy  will  be  healthier   if  the  relationship  between  companies   and  consumers  is  more  respectful  and   balanced.    That  is  much  more  sustainable   and  will  prevent  real  life  disasters.   Practical  advantages  of  applying  
 Privacy  by  Design  in  IoE  
  • 67. 2015  #EuroCACS  @marcvael In  short,  EVERYBODY  WINS     The  new  data  economy  will  bring  first   greater  stability  and  then  eventually   greater  profitability  as  people  become   more  comfortable  sharing  their  own   data.   Practical  advantages  of  applying  
 Privacy  by  Design  in  IoE  
  • 68. 2015  #EuroCACS  @marcvael By  adopting  a  sound  transparent  
 privacy-­‐by-­‐design  approach  from  the  start,  
 IoE  solution  providers  can  transform  
 their  innovative  ideas  into  good  practices  
 that  provide  long-­‐term  trust  and  value  for  
 both  IoE  users  and  themselves. Practical  advantages  of  applying  
 Privacy  by  Design  in  IoE  
  • 69. 2015  #EuroCACS  @marcvael Practical  advantages  of  applying  
 Privacy  by  Design  in  IoE Trust  in,  and  value  from,  
 IoE  solutions
  • 70. “If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.” Bruce Schneier, 
 Security Technologist (www.schneier.com)
  • 71. 2015  #EuroCACS  @marcvael So who is going to hold 
 the complete overview of your life?
  • 73. 2015  #EuroCACS  @marcvael You  want  to  know  more? Mireille Hildebrandt, Professor of Smart Environments, Data Protection and the Rule of Law at Radboud University Nijmegen, studies how constitutional governments function in cyberspace. It’s a very necessary study: on the internet, but also in other digital contexts, our behaviour is continually monitored and communicated. That's a breach of our civil rights.
  • 74. 2015  #EuroCACS  @marcvael almost 1000 guests from 43 different Countries Gender balance: 57% men – 43% women presence More than 60 panels, workshops and special sessions http://www.cpdpconferences.org You  want  to  know  more?
  • 76. 2015  #EuroCACS  @marcvael You  want  to  know  more? http://iotinternetofthingsconference.com
  • 77. 2015  #EuroCACS  @marcvael Contact details Mr. Marc Vael President ISACA BELGIUM vzw Koningsstraat 109 box 5 1000 Brussel Belgium www.isaca.be www.isaca.org president@isaca.be marc@vael.net http://www.linkedin.com/in/marcvael @marcvael