IoT Security Summit 2019 is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

Informa
Oct 31
Show Filter
8:30am - 8:40am 10 mins
Day 1 Shared Headliners: Industrial IoT, Smart Cities, IoT Security
Chairman's Opening Remarks
8:40am - 9:00am 20 mins
Info
Day 1 Shared Headliners: Industrial IoT, Smart Cities, IoT Security
The Role of IoT for the Connected Car - Revolutionizing Future Mobility with Data and Machine Learning
  • Using remote access to vehicle operation information and using GPS for drivers and passengers
  • Utilizing automotive mobile apps to enhance the driving experience
  • Using AI to create safety on the road by managing data effectively
9:00am - 9:20am 20 mins
Info
Day 1 Shared Headliners: Industrial IoT, Smart Cities, IoT Security
Unlocking the Potential for the Internet of Things with 5G Connectivity
  • Logistics, transportations and infrastructure applications planned to make use of the speed and dependability of 5G networks
9:20am - 9:40am 20 mins
Info
Day 1 Shared Headliners: Industrial IoT, Smart Cities, IoT Security
Harnessing IoT to Automate the Shipment Process and Industry
  • Using data and predictive analytics to optimize trucking routes and save time for delivery
  • Enabling customers to be able to validate the location of packages and relay information in real time
9:40am - 10:00am 20 mins
Info
Day 1 Shared Headliners: Industrial IoT, Smart Cities, IoT Security
Standards, Protocols and Platforms – What is the best wireless IoT network protocol?
  • Applying the IoT system architecture of devices, gateways and data systems across different channels to manage data effectively
  • Companies choosing the best applications for these protocols 
  • Exploring loRa vs. NBIoT
10:00am - 11:00am 60 mins
Info
Day 1 Shared Headliners: Industrial IoT, Smart Cities, IoT Security
PANEL: Securing IoT – Mitigating Security Challenges and Risks with the Internet of Things
  • Developing a strategy and framework in plan for an industrial environment 
  • Protecting your device by getting hacked with the right implementations
11:00am - 12:00pm 60 mins
Day 1 Shared Headliners: Industrial IoT, Smart Cities, IoT Security
Networking Coffee Break
11:30am - 11:40am 10 mins
IoT Security Keynotes
Chairman's Opening Remarks
11:40am - 12:00pm 20 mins
Info
IoT Security Keynotes
The skyhigh cost of saving money at the expense of Cybersecurity
  • Convenience and security are not necessarily compatible financially
  • Security is not a priority for device designers and manufacturers and embedding it can slow the time to reach the market
  • Implementing and maintaining a cybersecure company is expensive and security is usually the first to be cut, but the long-term cost is much higher than the initial dollars saved once cybersecurity is compromised through an attack
12:00pm - 12:40pm 40 mins
Info
IoT Security Keynotes
PANEL: Basic Hygiene for IoT Security within your company
  • What are basic steps that can be taken immediately to cope with legacy technologies, obsolete windows systems, etc to begin the process of cybersecuring companies that have implemented IoT solutions?
  • How do you cope with obsolete security measures such as plain text passwords, antivirus software that doesn’t update signatures, etc?
12:40pm - 1:40pm 60 mins
IoT Security Keynotes
Networking Lunch Break
1:40pm - 2:00pm 20 mins
IoT Security Content
Implementing practical internal standards as the first line of Cybersecurity defense
2:00pm - 2:20pm 20 mins
Info
IoT Security Content
Device-Centric IoT Security: How to create a simple, sustainable, robust IoT business
  • How an IT-centric approach to IoT security leaves sizeable gaps in the threat model
  • The embedded approach to IoT security and what it enables
  • The importance of managing the entire security lifecycle
  • How to simplify security integration in devices
2:20pm - 2:40pm 20 mins
Info
IoT Security Content
Using Google Cloud IoT Core to safely connect and manage devices
  • Devices and technologies within a business may vary, but they all need to be connected and managed
  • Google Cloud IoT Core provides a central and secure platform to connect and manage the devices as well as gain new operational insights and grow your business
  • Utilizes industry-standard MQTT protocol, as well as industry-standard security protocols and an auto-managed infrastructure – avoids setting up a complicated system at the get-go
2:40pm - 3:00pm 20 mins
Info
IoT Security Content
Utilizing 3rd Party Assessments to determine the best cybersecurity solution for you
  • It is a very complicated process to learn what solutions are available and which is right for your company’s needs
  • 3rd party assessment can provide objective analysis to help determine where your weaknesses are and how to develop a security solution that best fits the situation
  • It can also determine if your solutions are being utilized to the fullest extent and properly
3:00pm - 3:50pm 50 mins
IoT Security Content
Networking Coffee Break
3:50pm - 4:10pm 20 mins
Info
IoT Security Content
Cybersecuring Smart Cities: How do we manage risks in our increasingly connected urban areas?
  • Define a detailed cybersecurity strategy in line with your broader smart city strategy.  Ensure it can mitigate challenges that will arise around interoperability and interconnectedness of city systems and processes
  • Formalize your approach to both data and cyber governance with a comprehensive model detailing responsibilities and roles for each critical component in your city’s ecosystem
  • Build strategic partnerships – especially non-traditional ones – that can tap into cyber talent. Ex: Crowd sourcing, Prizes, and Challenges to solve cyber-related issues.
4:10pm - 4:30pm 20 mins
Info
IoT Security Content
Technology stacks that secure the smartest of cities
  • End-to-end encryption with NIST-approved algorithms to secure your data
  • Sensors using unique device keys and time-limited session keys
  • Preventing compromised sensors from affecting other sensors or gateways
4:30pm - 5:10pm 40 mins
Info
IoT Security Content
PANEL: Using a comprehensive, multi-layered approach to solving cybersecurity weaknesses
  • Implementing a strategy of several redundant measures to protect points of failure and enforcing it
  • Employing devices with embedded technologies: cryptographic chipset architectures, secure web gateways, etc
  • Utilizing systems with multiple security checks in the design: authentication and authorization measures