29 November 2018
Privacy & Security: Chair’s Welcome and Opening Comments
Keynote Panel: An E2E Approach to Tackling Data Security Challenges of the IoT
Enabling data security in IoT – protecting integrity, authenticity and confidentiality of information
Addressing the risks of big data – greater volume of sensitive data creating a greater risk of data and identity theft, device manipulation, data falsification, IP theft and server/network manipulation etc.
What are the different considerations for consumer owned connected device vs. those owned by legal entities?
Importance of other aspects of IoT security; testing, education of staff and physical security.
What influence will the incoming GDPR have on the IoT sector?
Case Study: Managing Your Identity and Privacy in the IoT
Solo: How Will GDPR Affect IoT Users and Vendors?
- In May 2018, the European General Data Protection Regulation, also known as GDPR, becomes enforceable.
- Discussing the fundamentals of GDPR, and the effect it will have for companies using and making IoT products.
- Who are the stakeholders affected and how can help you decipher this legislation?
- Will implementation of the GDPR limit innovation in the countries where it applies compared to ROW? Discussing models used in other parts of the world.
Panel: The Importance of Collaboration for IoT Security
- Understanding the unique challenges of security for the IoT, and that every party in the supply chain needs to understand these risks from chip vendors and software developers to ODM’s and service providers.
- How can companies across the ecosystem collaborate to ensure stronger security?
- What influence can different verticals have here – from securing smart cities to connected vehicles, and what are the different considerations for each?
- Analysing the role and efficacy of standards organisations in IoT security.
Case Study: The Role of Penetration Testing in IoT
The sheer number of devices involved within the IoT make it especially vulnerable to hackers, and hence penetration testing has a growing role within the IoT security lifecycle. What do companies developing and utilising IoT technologies have to consider to protect their devices and data from This talk will discuss the challenges and opportunities in this field, with real life examples from enterprises.