Day 2

21 October 2016

Data & Security

“As organizations step into IoT, they must understand the symbiotic relationship between it and big data. For IoT deployments to really make an impact, they must provide some sort of useful tool or service, while also collecting relevant data.” – ZDNet

Data has been described as the glue that holds the Internet of Things together. With a seemingly limitless numbers of connections, the Big Data generated has potential to streamline business processes, improve profit margins, and assist in customer retention and cost reduction. In these sessions we review how businesses can manage IoT generated Big Data for intelligent decision making. This track will delve into both consumer and business concerns over security which have arisen from the increasing connectivity brought about by IoT. With the application of IoT to an infinite number of devices, and the acceleration of the market, we will be exploring the new areas of technology which are responding to these perceived threats.  


Data & Security: Chair’s welcome and opening remarks

Robert Cohen

Senior Fellow

Economic Strategy Institute

Associated Talks:

View Full Info

. Robert Cohen, Senior Fellow, Economic Strategy Institute


Keynote: Data is everything

  • Where is IoT data making an impact?
  • Optimising the benefits of embedded sensor technology
  • Uncovering new economic structures made available by access to intelligent data
  • Consequences for businesses and consumers


Panel: IoT data analytics for intelligent decision making

Ashish Singh

GM/VP, Products

Triple Ring IOT

Associated Talks:

View Full Info

  • Identifying target-rich, high-value data that can be used to generate business intelligence
  • Using cloud analytics platforms to derive value from IoT data
  • Discussing the barriers to widespread IoT / Big Data value delivery and how these might be overcome
  • Data in practice – examples of how IoT data is creating business efficiencies and revolutionising working practices
. Ashish Singh, GM/VP, Products, Triple Ring IOT


Networking Break


Utilising the IoT for mass data collection and sharing

  • Harnessing the potential of the IoT and open data
  • Building data infrastructure that allows for interoperability
  • Allaying security concerns to encourage data sharing
  • Overcoming the scientific challenges of IoT data quality
  • Vision for the future


Defining data models for the IoT

  • Exploring how to apply best practices and standards in modern web architecture to the problem of interoperability of IoT data models
  • Working within device and network constraints whilst supporting advanced IoT protocol features
  • Releasing the benefits of IoT data to organisations


Networking Break


Secrets to performing scalable analytics with IoT data

  • Working with the right technology to meet the challenge of IoT data analytics
  • Acquiring and storing your data
  • Transforming data to make it suitable for analysis
  • Analytics to gain business insights


Panel: Tackling data security and privacy challenges of the IoT

Kasey Shah

Chief Enterprise Architect & Strategist

Nissan Motor Company

Associated Talks:

View Full Info

Senior Representative – OWASP

The Open Web Application Security Project

Associated Talks:

View Full Info

  • Understanding the unique challenges of security for the IoT, and preparing for the next evolutions of the technologies involve
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
  • Exploring issues of privacy – to what extent users require privacy, and how it can be maintained whilst still making data useful
. Kasey Shah, Chief Enterprise Architect & Strategist, Nissan Motor Company
. Senior Representative – OWASP, , The Open Web Application Security Project


Networking Break


Designed for Security – IoT Big Data Modelling

  • Challenges in IoT and security, privacy
  • Best practices of IoT Big Data Modelling
  • Latest development in Guaranteed Privacy and Secure MPC (multi-party computing)


Cyber security in the world of IoT

  • Looking at physical and cyber security solutions for the IoT-Connected Network
  • Discussing the increasing importance of putting cyber security at the heart of IoT
  • Saving your products from cyber security attacks – how to safely secure IoT products to limit consumer security concerns as a potential barrier in the purchase decision


Session Close