Day 2

28 June 2018

Privacy & Security

The amount of data that IoT devices produce is astounding, and currently, there is no enforced regulations as to how this data is stored and used.  This has prompted calls for companies to take responsibility for building security into the devices themselves, and  being held accountable for the protection of their users’ privacy and data. This track will delve into both consumer and business concerns over privacy which have arisen from the increasing connectivity brought about by IoT. With the application of IoT to an infinite number of devices, and the acceleration of the market, we will be exploring the new areas of technology which are responding to these perceived threats.



Privacy & Security: Chair’s welcome and opening comments


Keynote Panel: How will GDPR affect IoT users and vendors?

  • In May 2018, the European General Data Protection Regulation, also known as GDPR, becomes enforceable.
  • Discussing the fundamentals of GDPR, and the effect it will have for companies using and making IoT products.
  • Who are the stakeholders affected and how can help you decipher this legislation?
  • Will implementation of the GDPR limit innovation in the countries where it applies compared to ROW? Discussing models used in other parts of the world.


Case Study: Managing your identity and privacy in the IoT

With more and more IOT devices collecting data about you, from the devices you wear to your car and home and city, is the concept of privacy now outdated?  Should consumers and companies alike be considering the concept of different privacies for the different networks their IoT devices are part of?  This talk will explore this theme using real world examples from across industries.

As the cloud is the new home of connectivity, how can we ensure that IoT platforms are secure? Are Identity and Access Management technologies the answer?


Networking Break


Networking Break


Keynote: Legal Considerations for IoT devices, Consumer Protection 

IoT devices are the accumulators of a robust amount of data, and the protection of this data is paramount – how can you be sure that this is being protected/how can you protect this? This talk will address how to consider privacy and security throughout all aspects of product development from a legal standpoint, from contracts to implementation.


Panel: The importance of collaboration for IoT security

  • Understanding the unique challenges of security for the IoT, and that every party in the supply chain needs to understand these risks from chip vendors and software developers to ODM’s and service providers.
  • How can companies across the ecosystem collaborate to ensure stronger security?
  • What influence can different verticals have here – from securing smart cities to connected vehicles, and what are the different considerations for each?
  • Analysing the role and efficacy of standards organisations in IoT security.


Afternoon Keynote: Cyber Defence in action

This talk will feature top advice from a real IoT company dealing with cyber security threats, and will highlight some of the success stories from this sector.


Panel: The practicalities and challenges of securing IoT network infrastructure 

  • With the integration of IoT devices into our daily lives on the rise, does this mean that the stakes are higher when it comes to the security of these devices? How can we address security throughout the connected product lifecycle?
  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
  • Analysing the importance of other aspects of IoT security; testing, education of staff and physical security.


Building trust in IOT security

  • Is secure IoT a given now? Is trust now the key thing to earn from customers alike?
  • Preparing for the next evolutions of the devices involved in IoT and how to keep them secure. What do individual organisations need to do to mitigate anticipated security risks?
  • Discussing the increasing importance of making security your most valuable asset.
  • Saving your products from cybersecurity attacks – how to safely secure IoT products to limit consumer security concerns as a potential barrier in the purchase decision


Case Study: The role of penetration testing in IoT 

The sheer number of devices involved within the IoT make it especially vulnerable to hackers, and hence penetration testing has a growing role within the IoT security lifecycle. What do companies developing and utilising IoT technologies have to consider to protect their devices and data from This talk will discuss the challenges and opportunities in this field, with real life examples from enterprises.


Session End