Day 1

29 November 2017

Data & Security

“As organizations step into IoT, they must understand the symbiotic relationship between it and big data. For IoT deployments to really make an impact, they must provide some sort of useful tool or service, while also collecting relevant data.” – ZDNet
Data has been described as the glue that holds the Internet of Things together. With a seemingly limitless numbers of connections, the Big Data generated has potential to streamline business processes, improve profit margins, and assist in customer retention and cost reduction. In these sessions we review how businesses can manage IoT generated Big Data for intelligent decision making. This track will delve into both consumer and business concerns over security which have arisen from the increasing connectivity brought about by IoT. With the application of IoT to an infinite number of devices, and the acceleration of the market, we will be exploring the new areas of technology which are responding to these perceived threats.  

09:00AM

Data & Security: Chair’s welcome and opening comments

Brad Russell

Research Associate

Parks Associates

Associated Talks:

09:00AM - Day 1

View Data & Security: Chair’s welcome and opening comments

View Full Info

. Brad Russell, Research Associate, Parks Associates

09:20AM

Keynote: Data is everything

  • Where is IoT data making an impact?
  • Optimising the benefits of embedded sensor technology
  • Uncovering new economic structures made available by access to intelligent data – How to become a data driven company.
  • Can existing data silos be broken by the IoT?
  • Consequences for businesses and consumers

09:50AM

Panel: IoT data analytics for intelligent decision making

Brad Russell

Research Associate

Parks Associates

Associated Talks:

09:00AM - Day 1

View Data & Security: Chair’s welcome and opening comments

View Full Info

Harry Bergman

Data Tools Fellow

U.S. Department of Energy

Associated Talks:

09:50AM - Day 1

View Panel: IoT data analytics for intelligent decision making

View Full Info

David Coher

Principal, Reliability and Cybersecurity

Southern California Edison

Associated Talks:

09:50AM - Day 1

View Panel: IoT data analytics for intelligent decision making

View Full Info

  • Identifying target-rich, high-value data that can be used to generate business intelligence
  • Using cloud analytics platforms to derive value from IoT data
  • Discussing the barriers to widespread IoT/Big Data value delivery and how these might be overcome.
  • Real time data analytics in practice – examples of how IoT data is creating business efficiencies and revolutionising working practices
Moderator: . Brad Russell, Research Associate, Parks Associates
. Harry Bergman, Data Tools Fellow, U.S. Department of Energy
. David Coher, Principal, Reliability and Cybersecurity, Southern California Edison

10:30AM

Transforming the Edge

Oliver Gruner

Director, IoT Business Solutions

Stratus

Associated Talks:

10:30AM - Day 1

View Transforming the Edge

03:50PM - Day 1

View Panel: Predictive Maintenance for transforming field services and asset management

View Full Info

Moving all real-time data into the cloud has proven costly and has latency issues, exposing the need for an edge/cloud architecture. Manufacturers see the value of edge computing close to the shop floor and are seeking analytics solutions such as machine learning and predictive maintenance. Learn about real edge computing solutions from a leading IIoT vendor specializing in providing hardware and services to automation customers; and uncover:

  • The major reason for slowing down the adopt of IIoT solutions
  • What is missing to take the complexity and mysteriousness out of IIoT and security technologies
  • What organizations need for an affordable subscription

 

. Oliver Gruner, Director, IoT Business Solutions, Stratus

11:00AM

Networking Break

11:30AM

Harnessing the Power of Real Time Analysis in IIoT

Josh Jabs

Vice President of PKI and IoT

Entrust Datacard

Associated Talks:

03:50PM - Day 1

View Panel: The practicalities and challenges of securing IoT network infrastructure

11:30AM - Day 1

View Harnessing the Power of Real Time Analysis in IIoT

View Full Info

  • The future of manufacturing is moving from descriptive to prescriptive analytics and operational intelligence
  • The role of technology such as unmonitored plant and processes; gauges and sensor; remote monitoring by telemetry; semi-automated control and remote reporting of alarms
  • What can predictive platforms: devices that can autonomously adjust parameters based upon measured and received data, and artificial intelligence that creates its own rules and outcomes based on learned experiences play within the modern business?
  • Real life examples from across the industrial IoT.
. Josh Jabs, Vice President of PKI and IoT , Entrust Datacard

12:00PM

Panel: Blockchain – Building a chain of trust

Ahmed Banafa

IoT Expert, Faculty and Author

San Jose State University

View Full Info

  • How is Blockchain currently being implemented for within the IoT, including and beyond Bitcoin in the financial, insurance and healthcare industries.
  • Identity management and provenance for people, things, and IP – how Blockchain can improve your business.
  • Addressing the need for interoperability in Blockchain.
  • What are the challenges facing Blockchain on 3 specific levels; Technology, Business(es), and the Customer (Society as a whole)
Moderator: . Ahmed Banafa, IoT Expert, Faculty and Author, San Jose State University

12:40PM

Networking Break

01:40PM

Preparing for the future of IoT security

Randy Sabett

Vice Chair, Privacy & Data protection Practice

Cooley

Associated Talks:

02:10PM - Day 1

View Keynote Panel: An E2E approach to tackling data security challenges of the IoT

01:40PM - Day 1

View Preparing for the future of IoT security

View Full Info

  • Preparing for the next evolutions of the devices involved in IoT and how to keep them secure. What do individual organisations need to do to mitigate anticipated security risks?
  • Discussing the increasing importance of making security your most valuable asset and how security by design can help in that regard.
  • Saving your products from cybersecurity attacks – how to (a) safely and proactively secure IoT products to limit consumer security concerns as a potential barrier in the purchase decision and (b) react appropriately to any security incidents that arise.
  • Implementing security that can enhance flexibility to support future proofing and potential new services
. Randy Sabett, Vice Chair, Privacy & Data protection Practice, Cooley

02:10PM

Keynote Panel: An E2E approach to tackling data security challenges of the IoT

Merritt Maxim

Principal Analyst

Forrester

View Full Info

Tim Mackey

Senior Technical Evangelist

Black Duck Software

Associated Talks:

02:10PM - Day 1

View Keynote Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Senior Representative, Inpixon

Associated Talks:

02:10PM - Day 1

View Keynote Panel: An E2E approach to tackling data security challenges of the IoT

View Full Info

Randy Sabett

Vice Chair, Privacy & Data protection Practice

Cooley

Associated Talks:

02:10PM - Day 1

View Keynote Panel: An E2E approach to tackling data security challenges of the IoT

01:40PM - Day 1

View Preparing for the future of IoT security

View Full Info

  • Understanding the unique challenges of security for the IoT, and that every party in the supply chain needs to understand these risks from chip vendors and software developers to ODM’s and service providers.
  • Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
  • Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
  • What are the different considerations for consumer owned connected device vs. those owned by legal entities?
  • Importance of other aspects of IoT security; testing, education of staff and physical security.
Moderator: . Merritt Maxim, Principal Analyst, Forrester
. Tim Mackey, Senior Technical Evangelist , Black Duck Software
. Senior Representative, Inpixon, ,
. Randy Sabett, Vice Chair, Privacy & Data protection Practice, Cooley

02:50PM

Information Security in IoT Contracting

Nick Merker

Partner

Ice Miller

Associated Talks:

02:50PM - Day 1

View Information Security in IoT Contracting

View Full Info

Stephen Reynolds

Partner

Ice Miller

Associated Talks:

02:50PM - Day 1

View Information Security in IoT Contracting

View Full Info

  • Understand key terms pertaining to information security when negotiating a contract
  • Learn how to bring your vendors in compliance with your security program
  • Real life examples of how to solve some common security concerns in contractual negotiation
  • Understand the types of insurance coverages that pertain to technology and data security and how these insurances related to contracts with third parties
. Nick Merker, Partner, Ice Miller
. Stephen Reynolds, Partner, Ice Miller

03:20PM

Networking Break

03:50PM

Panel: The practicalities and challenges of securing IoT network infrastructure

Merritt Maxim

Principal Analyst

Forrester

View Full Info

Josh Jabs

Vice President of PKI and IoT

Entrust Datacard

Associated Talks:

03:50PM - Day 1

View Panel: The practicalities and challenges of securing IoT network infrastructure

11:30AM - Day 1

View Harnessing the Power of Real Time Analysis in IIoT

View Full Info

  • With the integration of IoT devices into our daily lives on the rise, does this mean that the stakes are higher when it comes to the security of these devices? How can we address security throughout the connected product lifecycle?
  • As the cloud is the new home of connectivity, how can we ensure that IoT platforms are secure? Are Identity and Access Management technologies the answer?
  • What is the value if any of penetration testing, and is there a place in the IoT ecosystem for hacking, ethical or otherwise?
Moderator: . Merritt Maxim, Principal Analyst, Forrester
. Josh Jabs, Vice President of PKI and IoT , Entrust Datacard

04:30PM

Case Study: Data Protection in USA Market

Ben Kieckhefer

Senator

State of Nevada

Associated Talks:

04:30PM - Day 1

View Case Study: Data Protection in USA Market

View Full Info

A case study specifically focusing on the North American market, and the regulations governing data protection within the IoT market, existing and future.

. Ben Kieckhefer, Senator, State of Nevada

05:00PM

Overcoming privacy challenges within a complex ecosystem

  • How can we enable users to help themselves – the extent to which privacy protection requires high user IT security competence?
  • The need for adapted security & privacy mechanisms that allow the benefits of IoT to be realised without endangering critical infrastructure or individual privacy.
  • Does the onus lie on companies for increased transparency with regards to data collection and usage?
  • The requirement for cross-application area standardisation.

05:30PM

Session Close

Powered by WishList Member - Membership Software