Telecoms, Media & Technology is part of the Knowledge and Networking Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

Key Sessions

Thien La

Journey to the Secure Cloud

Wellmark Blue Cross Blue Shield

8:30am 8:45am (15 mins)

Main agenda

Chairman’s Welcome

  • Chris Rezendes - Founder, Managing Director, IoT IMPACT LABS

8:40am 8:55am (15 mins)

Main agenda

Edge Security and the Cloud – securing and protecting IT perimeter

  • Exploring what are the security features of IoT and Cloud edge
  • What are the best practices to Help to protect against web-based security threats
  • What are the roles of EdgeHTML, modern web standards, certificate reputation system in the next generation of security standards

9:00am 9:20am (20 mins)

Main agenda

Finding the right IoT security strategy and methodology to secure the IoT network infrastructure - Title Sponsor Presentation - Juniper Networks

  • Kevin Walker - Security CTSO (Chief Technology and Strategy Officer), Juniper Networks

9:20am 9:35am (15 mins)

Main agenda

Journey to the Secure Cloud

  • Thien La - CISO, Wellmark Blue Cross Blue Shield

9:35am 9:55am (20 mins)

Main agenda

Building Trustworthy IoT Systems

  • Arjmand Samuel - Security lead for Microsoft Azure Internet of Things, Microsoft

9:55am 10:35am (40 mins)

Main agenda

Panel: Learning from Infamous Security Breaches

  • Reviewing some of the most recent and large scale enterprise breaches across industries
  • What were the vulnerabilities that malicious actors could exploit
  • How can we better prepare and how can enterprises influence security vendor collaboration
  • How can we better prepare and how can enterprises influence security vendor collaboration
  • David Hahn - CISO, Hearst

10:30am 11:30am (60 mins)

Main agenda

Networking Coffee Break & Exhibition Visit

11:30am 11:50am (20 mins)

Main agenda

Securing the Industrial IoT ecosystem and protection from DDoS attacks

  • What is the processes to identify vulnerabilities and how can security vendors protect critical infrastructure
  • Justifying cost of investment in security on enterprise level

11:50am 12:30pm (40 mins)

Main agenda

Panel: Use cases: How are data and devices secured across industries- Energy, Healthcare, Transportation

  • How is energy theft a major issue across the world and what providers can do to detect and mitigate it
  • The importance of building secure consumer devices and Smart Home products for the greater IoT security
  • What are the major vulnerabilities in the Shipping industry and how leaders are handling them
  • Jane Chang - Enterprise Architect, British Gas
  • Vijay Vedanabhatla - Principal Security Architect, UPS
  • Mandar Kawle - Sr. Director for External Entities, MasterCard

12:30pm 1:30pm (60 mins)

Main agenda

Networking Lunch Break

1:00pm 2:00pm (60 mins)

Interactive Sessions

White Hacking Demo by Independent Security Evaluators

Demonstrate exploits against devices

Show progression through an actual exploit, describing attack anatomy along the way

Provide a tangible sense for how IoT devices get broken and how to better secure them

  • Ted Harrington - Executive Partner, Independent Security Evaluators

2:00pm 3:00pm (60 mins)

Interactive Sessions

Security Workshops for Basic to Advanced - by Verizon

  • What makes an effective information security program for an organization? This educational presentation is intended to promote:
  • Awareness of the importance of need for IT security
  • Understanding of Cyber security vulnerabilities and corrective measures
  • The interactive discussion will focus on those information security risks facing all small organizations and how those risks can be identified and managed. Topics will include:
  • How your data is vulnerable
  • What you can lose through an information security breach
  • Practical steps to protect your operations
  • How to use information security vendors and consultants
  • How to evaluate tools and techniques based on your needs
  • This free educational program is intended for individuals and businesses with limited in-house resources to understand and implement IT security. City, county and state government entities, as well as small/medium/large c business owners & managers are encouraged to attend.
  • Marvin Stein - Sr. Security Architect/Engineer, Verizon

3:00pm 4:00pm (60 mins)

Interactive Sessions

Deploying blockchain for enterprises by Applied Blockchain

  • Overview of the trends moving past proof of concepts and toward live production solutions                     
  • Outline of the key benefits of blockchain                  
  • Smart contracts - what they are and how we use them                    
  • Gaps in the platforms for enterprises / businesses                
  • How to solve those gaps                    
  • Applied Blockchain use case examples across a range of industries  
  • Peter Bidewell - CMO, Applied Blockchain

1:30pm 1:50pm (20 mins)

Main agenda

Securing Smart Buildings of the Future

  • William Fitzgerald - Director of Global Product Security Technical Services, Johnson Controls

1:50pm 2:20pm (30 mins)

Main agenda

Exploring proven security vendors securing the IoT network infrastructure - How will 5G play into IoT

2:10pm 2:50pm (40 mins)

Main agenda

Panel All jobs are security jobs: Preparing the workforce to prevent and handle IT security challenges before they happen

  • Why security must be an essential component of all tech training
  • How C-level must strategically think of governance, risk, and compliance
  • Proving the value of penetration testing
  • Marvin Stein - Sr. Security Architect/Engineer, Verizon

3:20pm 4:10pm (50 mins)

Main agenda

Networking Break & Exhibit Visit

3:50pm 4:10pm (20 mins)

Main agenda

Can we continue to place trust in the everyday devices we rely on?

  • How should end to end encryption be treated and should corporations build decryption tools for counterterrorism purposes
  • What vulnerabilities does encryption has in light of recent attacks when encryption was compromised?
  • Learn how makers can build secure “things” and the security controls operators can implement

4:10pm 4:30pm (20 mins)

Main agenda

Security and Trustworthiness in IoT and Smart Cities/Communities

  • Sokwoo Rhee - Associate Director of Cyber-Physical Systems Program, National Institute of Standards and Technology

4:30pm 5:10pm (40 mins)

Main agenda

Panel Seeking collaboration and interoperability among security vendors across the IoT stack

  • Becoming the standard in IoT to solve interoperability challenges
  • Keeping the requirements of industrial and consumer IoT companies at the forefront
  • How investment banks and the security M&A space should structure the most powerful security vendors of the future
  • Christopher Caen - Community Development, Ecovacs Robotics
  • Mitchell Klein - Executive Director, Z- Wave Alliance
  • Ritesh Agrawal - Senior Director of Product Line Management, Juniper Networks
  • Nick Yuran - President, Vaxxin

5:10pm 5:20pm (10 mins)

Main agenda

Closing Remarks: Hiring Security Engineers...

  • With the rise in security challenges companies are racing to secure the best talent. What are the personnel and technical considerations that enterprises should keep in the forefront when hiring critical security personnel?

5:30pm 8:30pm (180 mins)

Main agenda

Networking Reception - Inquire to Sponsor a Rooftop Cocktail Party -