29 November 2017
Data & Security: Chair’s welcome and opening comments
Keynote: Data is everything
- Where is IoT data making an impact?
- Optimising the benefits of embedded sensor technology
- Uncovering new economic structures made available by access to intelligent data – How to become a data driven company.
- Can existing data silos be broken by the IoT?
- Consequences for businesses and consumers
Panel: IoT data analytics for intelligent decision making
Data Tools Fellow
U.S. Department of Energy
09:50AM - Day 1
City of Pasadena, California
09:50AM - Day 1
- Identifying target-rich, high-value data that can be used to generate business intelligence
- Using cloud analytics platforms to derive value from IoT data
- Discussing the barriers to widespread IoT/Big Data value delivery and how these might be overcome.
- Real time data analytics in practice – examples of how IoT data is creating business efficiencies and revolutionising working practices
Transforming the Edge
Director, IoT Business Solutions
10:30AM - Day 1
03:50PM - Day 1
Moving all real-time data into the cloud has proven costly and has latency issues, exposing the need for an edge/cloud architecture. Manufacturers see the value of edge computing close to the shop floor and are seeking analytics solutions such as machine learning and predictive maintenance. Learn about real edge computing solutions from a leading IIoT vendor specializing in providing hardware and services to automation customers; and uncover:
- The major reason for slowing down the adopt of IIoT solutions
- What is missing to take the complexity and mysteriousness out of IIoT and security technologies
- What organizations need for an affordable subscription
Harnessing the Power of Real Time Analysis in IIoT
- The future of manufacturing is moving from descriptive to prescriptive analytics and operational intelligence
- The role of technology such as unmonitored plant and processes; gauges and sensor; remote monitoring by telemetry; semi-automated control and remote reporting of alarms
- What can predictive platforms: devices that can autonomously adjust parameters based upon measured and received data, and artificial intelligence that creates its own rules and outcomes based on learned experiences play within the modern business?
- Real life examples from across the industrial IoT.
Cyber Defense and the Internet of Things: Immune System Security
Chief Channel Management Officer
12:00PM - Day 1
With 46 billion devices expected online by 2021, the IoT drastically expands networks’ attack surfaces. Although the security breach at Dyn last year brought their vulnerabilities into the spotlight, IoT devices are still manufactured without security in mind. Corporations are left to secure these devices and protect their networks from dangerous cyber-threats. With an estimated 25% of cyber-attacks taking place through the IoT, organizations need solutions – and fast.
Amid this evolving threat landscape, traditional security approaches fall short. Securing the perimeter is virtually impossible. Endpoint security becomes impractical and costly when any device connected to the internet, from a coffee machine to a video camera, is an avenue into the network. And relying on rules and signatures fails when protocols and capabilities vary as drastically as they do within the IoT.
‘Immune system’ cyber-defense represents a fundamental change in our ability to defend increasingly complex digital environments. Using AI algorithms, this self-learning technology understands what is normal for every user and device, and can detect new, emerging threats from inside the network, without prior knowledge of what to look for. Offering total visibility of all real-time interactions, an enterprise immune system also adapts itself constantly, allowing companies of all sizes to proactively protect data and critical systems.
In this session, we will discuss:
- The implications of enterprise, industrial, and consumer IoT for network security
- Why visibility across complex and expansive networks is so important – and difficult to get right
- How AI and machine learning automate threat detection and response
- Real-world examples of detected threats, from hacked conferencing systems to fish tanks
Preparing for the future of IoT security
- Preparing for the next evolutions of the devices involved in IoT and how to keep them secure. What do individual organisations need to do to mitigate anticipated security risks?
- Discussing the increasing importance of making security your most valuable asset and how security by design can help in that regard.
- Saving your products from cybersecurity attacks – how to (a) safely and proactively secure IoT products to limit consumer security concerns as a potential barrier in the purchase decision and (b) react appropriately to any security incidents that arise.
- Implementing security that can enhance flexibility to support future proofing and potential new services
Keynote Panel: An E2E approach to tackling data security challenges of the IoT
Senior Technical Evangelist
Black Duck Software
02:10PM - Day 1
Senior Representative, Inpixon
02:10PM - Day 1
- Understanding the unique challenges of security for the IoT, and that every party in the supply chain needs to understand these risks from chip vendors and software developers to ODM’s and service providers.
- Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
- Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
- What are the different considerations for consumer owned connected device vs. those owned by legal entities?
- Importance of other aspects of IoT security; testing, education of staff and physical security.
Information Security in IoT Contracting
02:50PM - Day 1
02:50PM - Day 1
- Understand key terms pertaining to information security when negotiating a contract
- Learn how to bring your vendors in compliance with your security program
- Real life examples of how to solve some common security concerns in contractual negotiation
- Understand the types of insurance coverages that pertain to technology and data security and how these insurances related to contracts with third parties
Panel: The practicalities and challenges of securing IoT network infrastructure
- With the integration of IoT devices into our daily lives on the rise, does this mean that the stakes are higher when it comes to the security of these devices? How can we address security throughout the connected product lifecycle?
- As the cloud is the new home of connectivity, how can we ensure that IoT platforms are secure? Are Identity and Access Management technologies the answer?
- What is the value if any of penetration testing, and is there a place in the IoT ecosystem for hacking, ethical or otherwise?
Case Study: Data Protection in USA Market
A case study specifically focusing on the North American market, and the regulations governing data protection within the IoT market, existing and future.
Overcoming privacy challenges within a complex ecosystem
- How can we enable users to help themselves – the extent to which privacy protection requires high user IT security competence?
- The need for adapted security & privacy mechanisms that allow the benefits of IoT to be realised without endangering critical infrastructure or individual privacy.
- Does the onus lie on companies for increased transparency with regards to data collection and usage?
- The requirement for cross-application area standardisation.