Day 1 - 29 November 2017

Data & Security

“As organizations step into IoT, they must understand the symbiotic relationship between it and big data. For IoT deployments to really make an impact, they must provide some sort of useful tool or service, while also collecting relevant data.” – ZDNet
Data has been described as the glue that holds the Internet of Things together. With a seemingly limitless numbers of connections, the Big Data generated has potential to streamline business processes, improve profit margins, and assist in customer retention and cost reduction. In these sessions we review how businesses can manage IoT generated Big Data for intelligent decision making. This track will delve into both consumer and business concerns over security which have arisen from the increasing connectivity brought about by IoT. With the application of IoT to an infinite number of devices, and the acceleration of the market, we will be exploring the new areas of technology which are responding to these perceived threats.  

09:00AM

Brad Russell

Research Associate

Parks Associates

Associated Talks:

09:00AM - Day 1

View Data & Security: Chair’s welcome and opening comments

View Full Info

Data & Security: Chair’s welcome and opening comments

. Brad Russell, Research Associate, Parks Associates
Hide Details
More Details

09:20AM

Hong Ding

Co-Founder and CEO

Esgyn

Associated Talks:

09:50AM - Day 1

View Panel: IoT data analytics for intelligent decision making

09:20AM - Day 1

View Keynote: Data is everything

View Full Info

Keynote: Data is everything

  • Where is IoT data making an impact?
  • Optimising the benefits of embedded sensor technology
  • Uncovering new economic structures made available by access to intelligent data – How to become a data driven company.
  • Can existing data silos be broken by the IoT?
  • Consequences for businesses and consumers
. Hong Ding, Co-Founder and CEO, Esgyn
Hide Details
More Details

09:50AM

Brad Russell

Research Associate

Parks Associates

Associated Talks:

09:00AM - Day 1

View Data & Security: Chair’s welcome and opening comments

View Full Info

Hong Ding

Co-Founder and CEO

Esgyn

Associated Talks:

09:50AM - Day 1

View Panel: IoT data analytics for intelligent decision making

09:20AM - Day 1

View Keynote: Data is everything

View Full Info

Harry Bergmann

Data Tools Fellow

U.S. Department of Energy

Associated Talks:

09:50AM - Day 1

View Panel: IoT data analytics for intelligent decision making

View Full Info

David Coher

Planning Commissioner

City of Pasadena, California

Associated Talks:

09:50AM - Day 1

View Panel: IoT data analytics for intelligent decision making

View Full Info

Panel: IoT data analytics for intelligent decision making

  • Identifying target-rich, high-value data that can be used to generate business intelligence
  • Using cloud analytics platforms to derive value from IoT data
  • Discussing the barriers to widespread IoT/Big Data value delivery and how these might be overcome.
  • Real time data analytics in practice – examples of how IoT data is creating business efficiencies and revolutionising working practices
Moderator: . Brad Russell, Research Associate, Parks Associates
. Hong Ding, Co-Founder and CEO, Esgyn
. Harry Bergmann, Data Tools Fellow, U.S. Department of Energy
. David Coher, Planning Commissioner , City of Pasadena, California
Hide Details
More Details

10:30AM

Oliver Gruner

Director, IoT Business Solutions

Stratus

Associated Talks:

10:30AM - Day 1

View Transforming the Edge

03:50PM - Day 1

View Panel: Predictive Maintenance for transforming field services and asset management

View Full Info

Transforming the Edge

Moving all real-time data into the cloud has proven costly and has latency issues, exposing the need for an edge/cloud architecture. Manufacturers see the value of edge computing close to the shop floor and are seeking analytics solutions such as machine learning and predictive maintenance. Learn about real edge computing solutions from a leading IIoT vendor specializing in providing hardware and services to automation customers; and uncover:

  • The major reason for slowing down the adopt of IIoT solutions
  • What is missing to take the complexity and mysteriousness out of IIoT and security technologies
  • What organizations need for an affordable subscription

 

. Oliver Gruner, Director, IoT Business Solutions, Stratus
Hide Details
More Details

11:00AM

Networking Break

11:30AM

Ensuring a Trusted Internet of Things: Securely Unlocking the Value of Digital Business

We are at the cusp of an era where our lives will rarely depart from a connected computing ecosystem of some kind. The pervasiveness of connected systems will generate entirely new business models based on services that consume the data from these connected systems under the larger themes of digital business.

Enormous business value is found when data crosses domain boundaries from systems that are optimized to sense the physical environment towards systems that are optimized to aggregate and synthesize data, creating real digital assets. This is the convergence of operational technology (OT) and information technology (IT).

While the Internet of Things provides abundant opportunities, it also opens doors to new threats that could have a significant impact on how we utilize and interact with technology.

A secure ecosystem is possible when people, devices, and systems are able to trust each other and the concepts of identity play a foundational role in establishing this trust. Solution must enable organizations to quickly establish trust in their infrastructure and secure the interaction between users, devices, and systems in a manner that recognizes the customer’s need to leverage existing environments and remain flexible in choosing devices, backend applications, and data analytics platforms best suited to their specific business environments.

Things (Physical, Logical and System Objects) are becoming increasingly capable of storing and processing cryptographic material and techniques are available to offload these requirements for legacy devices and systems that don’t have this capability. This enables Things to not only authenticate each other, but also to authorize actions based on policy. Data can also be secured as it is moved across domain boundaries. With these capabilities, enabled by identity security, business value can be unlocked within and across the domain of connected systems.

Effective security for the Internet of Things means enforcing, monitoring and maintaining consistent security policy across a large-scale heterogeneous ecosystem in a harsh operating environment. Let’s explore how identity driven security solution approach help in “Ensuring A Trusted Internet of Things”.

Hide Details
More Details

12:00PM

Ashley Broussard

Cyber Security Manager

Darktrace

Associated Talks:

12:00PM - Day 1

View Cyber Defense and the Internet of Things: Immune System Security

03:50PM - Day 1

View Panel: The practicalities and challenges of securing IoT network infrastructure

View Full Info

Cyber Defense and the Internet of Things: Immune System Security

With 46 billion devices expected online by 2021, the IoT drastically expands networks’ attack surfaces. Although the security breach at Dyn last year brought their vulnerabilities into the spotlight, IoT devices are still manufactured without security in mind. Corporations are left to secure these devices and protect their networks from dangerous cyber-threats. With an estimated 25% of cyber-attacks taking place through the IoT, organizations need solutions – and fast.

Amid this evolving threat landscape, traditional security approaches fall short. Securing the perimeter is virtually impossible. Endpoint security becomes impractical and costly when any device connected to the internet, from a coffee machine to a video camera, is an avenue into the network. And relying on rules and signatures fails when protocols and capabilities vary as drastically as they do within the IoT.
‘Immune system’ cyber-defense represents a fundamental change in our ability to defend increasingly complex digital environments. Using AI algorithms, this self-learning technology understands what is normal for every user and device, and can detect new, emerging threats from inside the network, without prior knowledge of what to look for. Offering total visibility of all real-time interactions, an enterprise immune system also adapts itself constantly, allowing companies of all sizes to proactively protect data and critical systems.
In this session, we will discuss:

  • The implications of enterprise, industrial, and consumer IoT for network security
  • Why visibility across complex and expansive networks is so important – and difficult to get right
  • How AI and machine learning automate threat detection and response
  • Real-world examples of detected threats, from hacked conferencing systems to fish tanks
. Ashley Broussard, Cyber Security Manager, Darktrace
Hide Details
More Details

12:30PM

Networking Break

01:40PM

Randy Sabett

Vice Chair, Privacy & Data protection Practice

Cooley

Associated Talks:

02:10PM - Day 1

View Keynote Panel: An E2E approach to tackling data security challenges of the IoT

01:40PM - Day 1

View Preparing for the future of IoT security

View Full Info

Preparing for the future of IoT security

  • Preparing for the next evolutions of the devices involved in IoT and how to keep them secure. What do individual organisations need to do to mitigate anticipated security risks?
  • Discussing the increasing importance of making security your most valuable asset and how security by design can help in that regard.
  • Saving your products from cybersecurity attacks – how to (a) safely and proactively secure IoT products to limit consumer security concerns as a potential barrier in the purchase decision and (b) react appropriately to any security incidents that arise.
  • Implementing security that can enhance flexibility to support future proofing and potential new services
. Randy Sabett, Vice Chair, Privacy & Data protection Practice, Cooley
Hide Details
More Details

02:10PM

Tom Sego

CEO

BlastWave Inc.

Associated Talks:

02:10PM - Day 1

View Keynote Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Tim Mackey

Senior Technical Evangelist

Black Duck Software

Associated Talks:

02:10PM - Day 1

View Keynote Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Randy Sabett

Vice Chair, Privacy & Data protection Practice

Cooley

Associated Talks:

02:10PM - Day 1

View Keynote Panel: An E2E approach to tackling data security challenges of the IoT

01:40PM - Day 1

View Preparing for the future of IoT security

View Full Info

Keynote Panel: An E2E approach to tackling data security challenges of the IoT

  • Understanding the unique challenges of security for the IoT, and that every party in the supply chain needs to understand these risks from chip vendors and software developers to ODM’s and service providers.
  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
  • What are the different considerations for consumer owned connected device vs. those owned by legal entities?
  • Importance of other aspects of IoT security; testing, education of staff and physical security.
. Tom Sego, CEO, BlastWave Inc.
. Tim Mackey, Senior Technical Evangelist , Black Duck Software
. Randy Sabett, Vice Chair, Privacy & Data protection Practice, Cooley
Hide Details
More Details

02:50PM

Judy Okenfuss

Managing Partner

Ice Miller

Associated Talks:

02:50PM - Day 1

View Information Security in IoT Contracting

View Full Info

Stephen Reynolds

Partner

Ice Miller

Associated Talks:

02:50PM - Day 1

View Information Security in IoT Contracting

View Full Info

Information Security in IoT Contracting

  • Understand key terms pertaining to information security when negotiating a contract
  • Learn how to bring your vendors in compliance with your security program
  • Real life examples of how to solve some common security concerns in contractual negotiation
  • Understand the types of insurance coverages that pertain to technology and data security and how these insurances related to contracts with third parties
. Judy Okenfuss, Managing Partner, Ice Miller
. Stephen Reynolds, Partner, Ice Miller
Hide Details
More Details

03:20PM

Networking Break

03:50PM

Sumit Dhoopar

Cyber Security Architect

Target

Associated Talks:

02:10PM - Day 2

View Case Study: Target

03:50PM - Day 1

View Panel: The practicalities and challenges of securing IoT network infrastructure

View Full Info

Aaron Guzman

Senior Representative

OWASP

Associated Talks:

03:50PM - Day 1

View Panel: The practicalities and challenges of securing IoT network infrastructure

View Full Info

Greg Wetmore

Vice President Product Development

Entrust Datacard

Associated Talks:

03:50PM - Day 1

View Panel: The practicalities and challenges of securing IoT network infrastructure

View Full Info

Ashley Broussard

Cyber Security Manager

Darktrace

Associated Talks:

12:00PM - Day 1

View Cyber Defense and the Internet of Things: Immune System Security

03:50PM - Day 1

View Panel: The practicalities and challenges of securing IoT network infrastructure

View Full Info

Panel: The practicalities and challenges of securing IoT network infrastructure

  • With the integration of IoT devices into our daily lives on the rise, does this mean that the stakes are higher when it comes to the security of these devices? How can we address security throughout the connected product lifecycle?
  • As the cloud is the new home of connectivity, how can we ensure that IoT platforms are secure? Are Identity and Access Management technologies the answer?
  • What is the value if any of penetration testing, and is there a place in the IoT ecosystem for hacking, ethical or otherwise?
. Sumit Dhoopar, Cyber Security Architect, Target
. Aaron Guzman, Senior Representative, OWASP
. Greg Wetmore, Vice President Product Development , Entrust Datacard
. Ashley Broussard, Cyber Security Manager, Darktrace
Hide Details
More Details

04:30PM

Ben Kieckhefer

Senator

State of Nevada

Associated Talks:

04:30PM - Day 1

View Case Study: Data Protection in USA Market

View Full Info

Case Study: Data Protection in USA Market

A case study specifically focusing on the North American market, and the regulations governing data protection within the IoT market, existing and future.

. Ben Kieckhefer, Senator, State of Nevada
Hide Details
More Details

05:00PM

Session Close