Cyber Security

OTTAWA, July 26, 2016 – TwelveDot Inc. (TwelveDot) is pleased to announce that it has been awarded another project within the Cyber Security Cooperation Program (CSCP) – a program launched on February 4, 2014 by the Government of Canada.

A five-year $1.5M initiative, the CSCP was developed in support of Canada’s Cyber Security Strategy. Its mission is to improve security of Canada’s vital cyber systems through grants and contributions to owners and operators, industrial and trade associations, academics and research organizations in support of eligible projects. The Government of Canada believes that securing the Internet of Things (IoT) is important and the CSCP is part of its efforts to do so.

The goal of this new project is to assess current IoT technologies and determine the threat and risk vectors for Internet of Things (IoT). TwelveDot, which has significant experience in IoT including its development of iBeacon solutions, Mach-12 and HiveSense, will create a test bed for evaluating IoT based technologies not just in the laboratory but also in production deployments. Included in this will be the creation of a monitoring technology specific to IoT deployments for identification of attacks on these networks. TwelveDot will produce a research report and guidance document for industry in both languages for publication in the spring of 2017.

IoT is growing at an exponential rate. According to Cisco, there will be 26.3 billion networked devices in 2020, up from 16.3 billion in 2015. In just four years time the number of devices connected to IP networks will be more than three times the global population.

Global Devices and Connections Growth

 

 

Source: Cisco VNI Global IP Traffic Forecast, 2015–2020

Furthermore, according to the International Data Corporation, the worldwide IoT market will grow from $655.8-billion (U.S.) in 2014 to $1.7-trillion in 2020 with a compound annual growth rate of 16.9 per cent. Despite this Canadian business appears to be behind the curve on security especially in IoT. A survey of top-level Canadian executives conducted on behalf of Microsoft Canada revealed that over half said they were completely unaware of IoT, 72 per cent were confused by it and 24 per cent said they had no sense of how it could impact their businesses. Consequently the need for education regarding IoT in Canada is great. TwelveDot is aiming to contribute to helping fill this need through this research project and bring some much needed education to securing these solutions.

“It is an honour to be awarded a second project under the CSCP program. Our first project was for mobile application security using TwelveDot’s proprietary GCAM methodology. We look forward to delivering on the mission of this project as well as helping to close the IoT gap in Canada by educating both businesses and citizens.” said Faud Khan, CEO and Chief Security Analyst, TwelveDot.

 

About TwelveDot Inc.

TwelveDot is a team of IT specialists that is obsessed with solving information and cyber security issues, in particular, the ones your company or organization faces. We help businesses of all sizes handle information and cyber security challenges and issues efficiently and cost-effectively. While organizations and companies struggle to ensure their data and operations are secure on a daily basis, many miss vital warning signs that something is amiss. This is where we come in as we are the canary in your cyber security coalmine. We are devoted to being your unbiased, objective and collaborative partner. We respect your privacy and will never share your sensitive information or keep your data. We want to help companies better understand their true data risks and how their teams can manage these risks effectively on a daily basis. We demystify the marketing speak of security solutions and focus on identifying and dealing with the risk and exposure elements.

 

For more information, please contact:

Faud Khan

Tel: 613.447.3393

Email: faud.khan@twelvedot.com

With the recent rash of Healthcare data breaches it raises an important concern why is this happening? Especially, given the regulatory frameworks in place to protect patient data. We could spend many resources to determine the root cause of these issues however, there might be a better approach to begin with.

Specifically, healthcare providers, product and service companies need to change their approach to how they collect and protect patient data. The protection chain and data lifecycle needs to be completely understood. Only then can we ensure that data breaches do not become the norm.

TwelveDot using sound security principles based on ISO Security Standards has developed an organizational approach to addressing healthcare security. We have created a White Paper entitled “A Systematic Approach to Cyber Health” that details what organizations need to accomplish and our approach to put them in a position to better secure data handled.

Our goal is that only using a systematic approach to cyber security can healthcare providers ensure they protect their patient data.

Please download it here, and as usual please reach out to us with your questions, comments and issues in healthcare.

Well it is hard to believe that 5 years have come and gone since I have started TwelveDot. It seems like just yesterday that we had our first big win with a customer who is still doing business with us BTW. It is great to see how many customers are coming back to use our services. I think this speaks to the quality of our staff and commitment to customer service. I would like to thank all our customers new and old who took a chance on us.

We are looking forward to another 5 years of business and developing new markets in the Middle East and Asia in the next few years. Thanks to our staff and partners who have made us successful to date and we look forward to working with all of you in the future.

All the Best,

Faud and the team at TwelveDot

 

Recently, I was asked to present to mobile operators in Malaysia on the topic of IPv6 security. As Malaysia is currently considering regulatory requirements to move to IPv6 some of the operators are struggling with being able to understand the security implications of moving to this new protocol.

The key aspects of my talk {which I am attach below} basically consider the following:
1. Create and maintain an ISMS
2. Threat Model all solutions options for architectural changes
3. Monitor at 6to4 for signs of suspicious activity
4. Evaluate security vendors for ability to monitor IPV6 traffic
5. Don’t let the vendors push you around. If they want your money they need to add the security features you want.
6. Evaluate all technology prior to deployment including technical assessments of the each device and platform being introduced to the network.
7. Ensure your lab is stocked with attack code and toolkits
8. Train, train, train your staff to be comfortable with v6
9. Understand we are still learning and will be for a while. Don’t be afraid to discuss your issues with your competitors because I can tell you they are experiencing the same issues.

Thanks again to MCMC for inviting me to share my knowledge. I look forward to visiting Kuala Lumpur again soon.

 

Presentation: IPv6 Security Best Practices – Oct 20_2015_v1

Over the past few months, we have been working with the Chang School at Ryerson to develop a one day seminar on cyber security. The goal is to get more executives and board members comfortable talking about security and ensuring they have strong security strategies regardless of sector. The staff at Ryerson have been great at supporting our ideas and concepts and are helping this course become a reality. From an educational perspective, these are the key aspects that will be discuss during the session:

  1. Principles of a Cyber Security Strategy
  2. A Case Study
  3. Implementing a Risk Management Process
  4. Preparing for a Breach including a drafting a Breach and Cyber Security Playbook

There will be lots of open discussions and examples on these topics and you can pick my brain on these issues specific to your company or sector. I am looking forward to spending the day exchanging, learning and sharing. Bring your questions and problems and I hope to see you on Sept.24th. More details to the course and registration are located here http://ow.ly/QeiK2.

 

Faud Khan