Day 1 - 29 November 2017
Data & Security: Chair’s welcome and opening comments
Keynote: Data is everything
- Where is IoT data making an impact?
- Optimising the benefits of embedded sensor technology
- Uncovering new economic structures made available by access to intelligent data – How to become a data driven company.
- Can existing data silos be broken by the IoT?
- Consequences for businesses and consumers
Data Tools Fellow
U.S. Department of Energy
09:50AM - Day 1
City of Pasadena, California
09:50AM - Day 1
Panel: IoT data analytics for intelligent decision making
- Identifying target-rich, high-value data that can be used to generate business intelligence
- Using cloud analytics platforms to derive value from IoT data
- Discussing the barriers to widespread IoT/Big Data value delivery and how these might be overcome.
- Real time data analytics in practice – examples of how IoT data is creating business efficiencies and revolutionising working practices
Director, IoT Business Solutions
10:30AM - Day 1
03:50PM - Day 1
Transforming the Edge
Moving all real-time data into the cloud has proven costly and has latency issues, exposing the need for an edge/cloud architecture. Manufacturers see the value of edge computing close to the shop floor and are seeking analytics solutions such as machine learning and predictive maintenance. Learn about real edge computing solutions from a leading IIoT vendor specializing in providing hardware and services to automation customers; and uncover:
- The major reason for slowing down the adopt of IIoT solutions
- What is missing to take the complexity and mysteriousness out of IIoT and security technologies
- What organizations need for an affordable subscription
Ensuring a Trusted Internet of Things: Securely Unlocking the Value of Digital Business
We are at the cusp of an era where our lives will rarely depart from a connected computing ecosystem of some kind. The pervasiveness of connected systems will generate entirely new business models based on services that consume the data from these connected systems under the larger themes of digital business.
Enormous business value is found when data crosses domain boundaries from systems that are optimized to sense the physical environment towards systems that are optimized to aggregate and synthesize data, creating real digital assets. This is the convergence of operational technology (OT) and information technology (IT).
While the Internet of Things provides abundant opportunities, it also opens doors to new threats that could have a significant impact on how we utilize and interact with technology.
A secure ecosystem is possible when people, devices, and systems are able to trust each other and the concepts of identity play a foundational role in establishing this trust. Solution must enable organizations to quickly establish trust in their infrastructure and secure the interaction between users, devices, and systems in a manner that recognizes the customer’s need to leverage existing environments and remain flexible in choosing devices, backend applications, and data analytics platforms best suited to their specific business environments.
Things (Physical, Logical and System Objects) are becoming increasingly capable of storing and processing cryptographic material and techniques are available to offload these requirements for legacy devices and systems that don’t have this capability. This enables Things to not only authenticate each other, but also to authorize actions based on policy. Data can also be secured as it is moved across domain boundaries. With these capabilities, enabled by identity security, business value can be unlocked within and across the domain of connected systems.
Effective security for the Internet of Things means enforcing, monitoring and maintaining consistent security policy across a large-scale heterogeneous ecosystem in a harsh operating environment. Let’s explore how identity driven security solution approach help in “Ensuring A Trusted Internet of Things”.
Cyber Defense and the Internet of Things: Immune System Security
With 46 billion devices expected online by 2021, the IoT drastically expands networks’ attack surfaces. Although the security breach at Dyn last year brought their vulnerabilities into the spotlight, IoT devices are still manufactured without security in mind. Corporations are left to secure these devices and protect their networks from dangerous cyber-threats. With an estimated 25% of cyber-attacks taking place through the IoT, organizations need solutions – and fast.
Amid this evolving threat landscape, traditional security approaches fall short. Securing the perimeter is virtually impossible. Endpoint security becomes impractical and costly when any device connected to the internet, from a coffee machine to a video camera, is an avenue into the network. And relying on rules and signatures fails when protocols and capabilities vary as drastically as they do within the IoT.
‘Immune system’ cyber-defense represents a fundamental change in our ability to defend increasingly complex digital environments. Using AI algorithms, this self-learning technology understands what is normal for every user and device, and can detect new, emerging threats from inside the network, without prior knowledge of what to look for. Offering total visibility of all real-time interactions, an enterprise immune system also adapts itself constantly, allowing companies of all sizes to proactively protect data and critical systems.
In this session, we will discuss:
- The implications of enterprise, industrial, and consumer IoT for network security
- Why visibility across complex and expansive networks is so important – and difficult to get right
- How AI and machine learning automate threat detection and response
- Real-world examples of detected threats, from hacked conferencing systems to fish tanks
Preparing for the future of IoT security
- Preparing for the next evolutions of the devices involved in IoT and how to keep them secure. What do individual organisations need to do to mitigate anticipated security risks?
- Discussing the increasing importance of making security your most valuable asset and how security by design can help in that regard.
- Saving your products from cybersecurity attacks – how to (a) safely and proactively secure IoT products to limit consumer security concerns as a potential barrier in the purchase decision and (b) react appropriately to any security incidents that arise.
- Implementing security that can enhance flexibility to support future proofing and potential new services
02:10PM - Day 1
Senior Technical Evangelist
Black Duck Software
02:10PM - Day 1
Keynote Panel: An E2E approach to tackling data security challenges of the IoT
- Understanding the unique challenges of security for the IoT, and that every party in the supply chain needs to understand these risks from chip vendors and software developers to ODM’s and service providers.
- Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
- Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
- What are the different considerations for consumer owned connected device vs. those owned by legal entities?
- Importance of other aspects of IoT security; testing, education of staff and physical security.
Information Security in IoT Contracting
- Understand key terms pertaining to information security when negotiating a contract
- Learn how to bring your vendors in compliance with your security program
- Real life examples of how to solve some common security concerns in contractual negotiation
- Understand the types of insurance coverages that pertain to technology and data security and how these insurances related to contracts with third parties
Cyber Security Architect
02:10PM - Day 2
03:50PM - Day 1
03:50PM - Day 1
Vice President Product Development
03:50PM - Day 1
Panel: The practicalities and challenges of securing IoT network infrastructure
- With the integration of IoT devices into our daily lives on the rise, does this mean that the stakes are higher when it comes to the security of these devices? How can we address security throughout the connected product lifecycle?
- As the cloud is the new home of connectivity, how can we ensure that IoT platforms are secure? Are Identity and Access Management technologies the answer?
- What is the value if any of penetration testing, and is there a place in the IoT ecosystem for hacking, ethical or otherwise?
State of Nevada
04:30PM - Day 1
Case Study: Data Protection in USA Market
A case study specifically focusing on the North American market, and the regulations governing data protection within the IoT market, existing and future.