29 November 2017
Data & Security: Chair’s welcome and opening comments
Keynote: Data is everything
- Where is IoT data making an impact?
- Optimising the benefits of embedded sensor technology
- Uncovering new economic structures made available by access to intelligent data – How to become a data driven company.
- Can existing data silos be broken by the IoT?
- Consequences for businesses and consumers
Panel: IoT data analytics for intelligent decision making
Data Tools Fellow
U.S. Department of Energy
09:50AM - Day 1
Principal, Reliability and Cybersecurity
Southern California Edison
09:50AM - Day 1
- Identifying target-rich, high-value data that can be used to generate business intelligence
- Using cloud analytics platforms to derive value from IoT data
- Discussing the barriers to widespread IoT/Big Data value delivery and how these might be overcome.
- Real time data analytics in practice – examples of how IoT data is creating business efficiencies and revolutionising working practices
Transforming the Edge
Director, IoT Business Solutions
10:30AM - Day 1
03:50PM - Day 1
Moving all real-time data into the cloud has proven costly and has latency issues, exposing the need for an edge/cloud architecture. Manufacturers see the value of edge computing close to the shop floor and are seeking analytics solutions such as machine learning and predictive maintenance. Learn about real edge computing solutions from a leading IIoT vendor specializing in providing hardware and services to automation customers; and uncover:
- The major reason for slowing down the adopt of IIoT solutions
- What is missing to take the complexity and mysteriousness out of IIoT and security technologies
- What organizations need for an affordable subscription
Harnessing the Power of Real Time Analysis in IIoT
- The future of manufacturing is moving from descriptive to prescriptive analytics and operational intelligence
- The role of technology such as unmonitored plant and processes; gauges and sensor; remote monitoring by telemetry; semi-automated control and remote reporting of alarms
- What can predictive platforms: devices that can autonomously adjust parameters based upon measured and received data, and artificial intelligence that creates its own rules and outcomes based on learned experiences play within the modern business?
- Real life examples from across the industrial IoT.
Panel: Blockchain – Building a chain of trust
- How is Blockchain currently being implemented for within the IoT, including and beyond Bitcoin in the financial, insurance and healthcare industries.
- Identity management and provenance for people, things, and IP – how Blockchain can improve your business.
- Addressing the need for interoperability in Blockchain.
- What are the challenges facing Blockchain on 3 specific levels; Technology, Business(es), and the Customer (Society as a whole)
Preparing for the future of IoT security
- Preparing for the next evolutions of the devices involved in IoT and how to keep them secure. What do individual organisations need to do to mitigate anticipated security risks?
- Discussing the increasing importance of making security your most valuable asset and how security by design can help in that regard.
- Saving your products from cybersecurity attacks – how to (a) safely and proactively secure IoT products to limit consumer security concerns as a potential barrier in the purchase decision and (b) react appropriately to any security incidents that arise.
- Implementing security that can enhance flexibility to support future proofing and potential new services
Keynote Panel: An E2E approach to tackling data security challenges of the IoT
Senior Technical Evangelist
Black Duck Software
02:10PM - Day 1
Senior Representative, Inpixon
02:10PM - Day 1
- Understanding the unique challenges of security for the IoT, and that every party in the supply chain needs to understand these risks from chip vendors and software developers to ODM’s and service providers.
- Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
- Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
- What are the different considerations for consumer owned connected device vs. those owned by legal entities?
- Importance of other aspects of IoT security; testing, education of staff and physical security.
Information Security in IoT Contracting
02:50PM - Day 1
02:50PM - Day 1
- Understand key terms pertaining to information security when negotiating a contract
- Learn how to bring your vendors in compliance with your security program
- Real life examples of how to solve some common security concerns in contractual negotiation
- Understand the types of insurance coverages that pertain to technology and data security and how these insurances related to contracts with third parties
Panel: The practicalities and challenges of securing IoT network infrastructure
- With the integration of IoT devices into our daily lives on the rise, does this mean that the stakes are higher when it comes to the security of these devices? How can we address security throughout the connected product lifecycle?
- As the cloud is the new home of connectivity, how can we ensure that IoT platforms are secure? Are Identity and Access Management technologies the answer?
- What is the value if any of penetration testing, and is there a place in the IoT ecosystem for hacking, ethical or otherwise?
Case Study: Data Protection in USA Market
A case study specifically focusing on the North American market, and the regulations governing data protection within the IoT market, existing and future.
Overcoming privacy challenges within a complex ecosystem
- How can we enable users to help themselves – the extent to which privacy protection requires high user IT security competence?
- The need for adapted security & privacy mechanisms that allow the benefits of IoT to be realised without endangering critical infrastructure or individual privacy.
- Does the onus lie on companies for increased transparency with regards to data collection and usage?
- The requirement for cross-application area standardisation.