Featured
Panel: Why is Device Trust important for IoT Data?
Julie Roberts, CEO, Armored Things, Rob Curtin, Director, Higher Edu, Microsoft and Khalil Yazdi, Chief Strategy Officer, XIG
Join this interactive panel session with special guests Julie Roberts from Armored Things and Rob Curtin from Microsoft. The session will be moderated by Khalil Yazdi of Crossroad Innovation Group and include topics such as:
- New business models and capabilities within IoT
- The importance of device trust for data trust
- Unique challenges for harnessing information from disparate devices
- Looking at IoT initiatives like smart cities, including large venues and university campuses
- Considerations about personal data collection and how it’s used
All episodes
-
Introduction to the IoT Security Summit: Edge to Enterprise
Darron Antill, CEO, Device Authority and Kevin Bocek, VP Security Strategy & Threat Intelligence, Venafi
The opening session for the virtual IoT Security Summit hosted by Device Authority with special guests throughout the 3 days. We'll provide an introduction to the theme of the event and provide an overview of what can be expected. We'll be joined by special guest, Kevin Bocek, VP Security Strategy & Threat Intelligence at Venafi.
-
An analyst insight into the current IoT IAM market
Divya Baranawal, Research Director, Quadrant Knowledge Solutions
Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.
This interactive session will focus on:
* Key capabilities of IoT IAM platforms to meet the requirements of IoT security
* Understand why IoT IAM is substantially different from Traditional IAM
* Current state of the market / vendors
* Market drivers and expected growth (importance of IoT IAM) -
What is the IoT edge and why is security important?
Steve Busby, Microsoft and James Penney, Device Authority
The edge of the IoT is where the action is. It includes a wide array of sensors, actuators, and devices—those system end-points that interact with and communicate real-time data from smart products and services. From a security standpoint, data at the edge can be troublesome, especially when it’s being handled by different devices that might not be as secure as centralized or cloud-based systems. As the number of IoT devices grows, it’s imperative that IT understands the potential security issues and makes sure those systems can be secured.
-
Kubernetes at the Edge of Manufacturing
Matt Bates, CTO and Co-founder Jetstack, and James Penney, CTO, Device Authority
Bringing more and more intelligence close to the manufacturing floor brings new levels of agility and product innovation. Kubernetes is the operating system for today’s cloud-native generation, and the right fit to bring powerful compute, analytics, and automation right to the factory floor. Extending capabilities once only reserved for the cloud next to assembly line means that identity is critical. Good news: Building in machine identity for your devices at the Edge closest to your production is simpler, faster, easier than ever before with Kubernetes. Learn how Kubernetes and CNCF Sandbox project cert-manager are bringing machine identity that’s shockingly simple and ready to scale.
-
IoT and Cyber Insurance: why is it important and what are the challenges?
Rob Black, CISSP, Founder and Managing Principal, Fractional CISO
The explosion of IoT devices is dramatically changing the cyber risk landscape — and not necessarily for the better. Many security experts believe that smart devices are creating a wave of vulnerabilities because they often lack strong — or, in some cases, even basic — security features. IoT devices often also lack regular product support, such as updates and patches, making them particularly vulnerable to newly discovered weaknesses.
-
A snapshot into the unique challenges of Smart Cities and how to secure them
Khalil Yazdi, Chief Strategy Officer, XIG and Tyler Gannon, VP Strategic Alliances, Device Authority
Smart cities are no longer a concept or futuristic dream. Thanks to Internet of Things (IoT) solutions, many are already active and expanding rapidly. Municipal governments are leveraging cellular and Low Power Wide Area (LPWAN) wireless technologies to connect and improve infrastructure, efficiency, convenience, and quality of life for residents and visitors alike. But what are the key challenges of Smart Cities? That's what we'll look at during this session, and we'll touch upon a critical factor - security.
-
Challenges in the IoT journey and 5 easy steps to solve them
Patrick Nash, InVMA, Charlie Manners, InVMA and Paul Lockley, Device Authority
Join this fireside chat with InVMA and Device Authority to learn about the real world challenges facing organisations on their IoT journey today. Find out about real insights and learn about potential solutions to improve your IoT project success and deliver ROI faster.
-
How to ensure Trust & Security for MCUs without TF-M, TPM or Secure Element chip
Hervé Roche, VP Marketing, Trusted Objects & Rob Dobson, VP Technology, Device Authority
In this session Trusted Objects and Device Authority will discuss the alternatives for providing Root of Trust (RoT) on devices which don’t have MCUs with TF-M (TrustZone) nor a TPM or Secure Element chip. Alongside this the speakers will be discussing how coupling a software RoT with security automation makes Edge to Cloud possible for large scale IoT, including legacy IoT devices.
-
Stop worrying and love SBOM – What is it? Why? How does it help you manage risk?
Rob Brown, Co-Founder & VP Marketing, Jitsuin, Will Godfrey, Jitsuin and Rob Dobson, Device Authority
President Biden's Executive Order to improve cybersecurity directly relates to the trustworthiness and transparency in ALL digital infrastructure (IT, OT, IoT, IIoT). Anything that runs software is in scope – cloud services, on-prem application servers and connected things. Rogue or malfunctioning software is difficult to spot, and often stems from the lack of transparency in development of commercial software. A one-shot security evaluation or pentest is not enough – proof of security and safety must accompany any software throughout its useful lifespan. The Executive Order calls to equip federal users with a new defense that will deliver trust through transparency: the SBOM. This session will outline what an SBOM is and how it helps organisations to manage risk.
-
The role of AI in IoT security for preventing zero day attacks
Marc Canel, Imagination Technologies and James Penney, CTO, Device Authority
Zero day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. Weakness can reside in the architecture at the device or system level, the implementation, the provisioning, the lifecycle management, the device or system administration. Learn how to prevent zero day attacks with technologies such as AI, utilising anomaly detection in IoT and other techniques.
-
The current state of the Industrial IoT (IIoT) and Cybersecurity
Tony Shakib, General Manager, Microsoft Azure IoT and Arjmand Samuel, Azure IoT Security Lead, Microsoft
The IIoT consists of internet-connected machinery and the advanced analytics platforms that process the data they produce. IIoT devices range from tiny environmental sensors to complex industrial robots. While the word “industrial” may call to mind warehouses, shipyards and factory floors, IIoT technologies hold a lot of promise for a diverse range of industries, including agriculture, healthcare, financial services, retail and advertising. During this session we'll take a look at how Industrial IoT is changing, what the latest use cases are and what challenges organisations are facing - with tips for how to solve or avoid them.
-
Bring Your Own (Connected Car) Key: Security in the Automotive Industry
David Low, Worldwide Director of Professional Services, Entrust and Paul Lockley, VP Sales EMEA, Device Authority
During this session, speakers from Entrust and Device Authority will outline how to secure your data, comply with regulatory and industry standards, and protect your organization’s reputation using best-in-class approaches for Key Management in the Automotive industry. We'll take a look at a customer, their challenges and how the solutions to overcome them.
-
Who's Playing with Your Food: Real-world IoT Threats to Food and Agriculture
Kristin Demoranville, Head of Cyber Risk and Advisory, Americas, BSI and Rob Dobson, VP Technology, Device Authority
As businesses strive to become more sustainable and environmentally friendly, deployment of Internet of Things (IoT) technologies will increase within industrial and enterprise environments. Automation improvements and Artificial Intelligence (AI) will rely on IoT devices to monitor and report the state of farms, crops, factories, and livestock in real-time. The addition of all these internet-connected devices will create a considerable cybersecurity threat that most organizations are unprepared to handle or do not even know will become an issue.
Investing in technology is step one to ensure cybersecurity resilience, but where should businesses invest first? Indeed, what updates to existing technology platforms are needed to improve organizational resilience?
With the new Infrastructure Bill set to pass in the US Congress, an influx of money will enable organizations to strengthen, upgrade, and future-proof cybersecurity, whilst in Europe, ENISA has published guidelines for securing IoT. In the UK, the National Cyber Security Centre (NCSC) and the National Farmers Union (NFU) recently issued guidelines to help farmers combat cybersecurity in the agriculture sector. Regulations are helpful to create a common language, but often organizations are left with "where do we start" or "I don't know how to spend my budget effectively."
In this webinar, Robert Dobson from Device Authority and Kristin Demoranville from BSI will get together for an informal conversation focusing on the new cybersecurity challenges faced for Industry 4.0, in particular, taking a look at food and agricultural organizations worldwide examining the need for security controls covering people, process and technologies.
-
How to achieve compelling ROI in real IoT customer use cases
Paul Lockley, VP Sales EMEA, and Tyler Gannon, VP Strategic Alliances, Device Authority
Hear about 3 real customer use cases where significant ROI was delivered by implementing an automated, secure IoT strategy.
-
How eSIM Helps to Keep the IoT SAFE
Ronald Weststrate - VP, Product Management CaaS and John Chambers - VP, Sales EAP, KORE
From fleet to industrial equipment, smart meters, healthcare applications, and more, all types of industries can achieve substantial improvements using eSIM as part of their IoT ecosystem. With eSIM technology, you can leverage embedded connectivity that provides global coverage right out of the box and advanced auto-provisioning capabilities that ensure it’s always on the right network for your service needs.
Join us as we discuss how you can install one SIM, one time – and enjoy coverage wherever it’s needed and connectivity that lasts the entire device lifecycle and take advantage of new IoT SAFE - Chip to Cloud security.
-
Your Quickest and Safest Route to IoT Device Trust
Ben Benson, Senior Technical Architect, Device Authority
Learn how our managed service platform, KSaaS, can secure your IoT ecosystem without the burden of infrastructure of dedicated resources. Our KeyScaler-as-a-Service platform is evolving. Discover how KSaaS is the simplest, quickest, and most efficient way to implement industry-leading IoT device security without the initial outlay for complex infrastructure and specialised resources. KSaaS offers the full power of the KeyScaler platform and solutions, simply providing the intuitive interfaces you need to focus on what matters to you - device trust. Plus - a sneak preview of some of our roadmap developments, and how KSaaS can harness the power of Machine Learning with industry-wide device data to make your platform more intelligent, and more secure.
-
The Promise of IoT for Agile Factories of the Future
Lux Chakrapani, Director and Business Strategy Leader, Microsoft and Tyler Gannon, VP Strategic Alliances, Device Authority
There are many challenges facing the manufacturing industry. A major hurdle is that enacting design changes in the production line is often difficult and time consuming. Factory layouts need to be more flexible to meet customer expectations of faster delivery and more customized products. This session will focus on how businesses worldwide are leveraging the power of connected/IoT devices to create operational visibility, increase productivity, and improve overall operations within Smart Factories.
-
Panel: Why is Device Trust important for IoT Data?
Julie Roberts, CEO, Armored Things, Rob Curtin, Director, Higher Edu, Microsoft and Khalil Yazdi, Chief Strategy Officer, XIG
Join this interactive panel session with special guests Julie Roberts from Armored Things and Rob Curtin from Microsoft. The session will be moderated by Khalil Yazdi of Crossroad Innovation Group and include topics such as:
- New business models and capabilities within IoT
- The importance of device trust for data trust
- Unique challenges for harnessing information from disparate devices
- Looking at IoT initiatives like smart cities, including large venues and university campuses
- Considerations about personal data collection and how it’s used