Telecoms, Media & Technology is part of the Knowledge and Networking Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

Informa
Key Sessions

Ritesh Agrawal

Securing IoT with a New Paradigm

Juniper Networks

Discussing GDPR and regulatory compliance and its effect on multinational companies

Panel Use cases: What the recent security breaches have taught us and what we need to improve

8:00am - 8:50am 50 mins
Main agenda
Breakfast
8:50am - 9:00am 10 mins
Main agenda
Opening Remarks
9:00am - 9:20am 20 mins
Main agenda
Securing IoT with a New Paradigm
  • Ritesh Agrawal - Sr. Director, Security Specialist SE, Juniper Networks
more
9:20am - 9:40am 20 mins
Main agenda
Discussing GDPR and regulatory compliance and its effect on multinational companies
more
  • How new Privacy and data protection laws evolve around the world and how to prepare and handle the challenges
9:40am - 10:20am 40 mins
Main agenda
Panel Use cases: What the recent security breaches have taught us and what we need to improve
more
  • Reviewing some of the most recent and large scale enterprise breaches across industries
  • What were the vulnerabilities that malicious actors could exploit
  • How can we better prepare and how can enterprises influence security vendor collaboration
  • How can we better prepare and how can enterprises influence security vendor collaboration
10:40am - 11:30am 50 mins
Main agenda
Coffee Break & Expo Hall Visit
11:40am - 12:00pm 20 mins
Main agenda
Privacy – it’s not just for “IT” but “OT” too – just ask the GDPR folks-
  • Mike Davis - CISO, Alliantgroup
more

Privacy is not just for people, but ‘entities’ too – smart devices that make critical system decisions, supporting both property safety and human lives.Being prepared and designing privacy into the system lifecycle is now more mandatory than ever. Paying fines for not being GDPR compliant could be the least of your worries; whereas being taken to court for massive property damage or loss of life can ruin a company, both financially and brand / trust – your client base!  This ‘Privacy in IoT’ short overview will provide ‘just the facts” and what you really must do now (really yesterday….)

12:00pm - 12:40pm 40 mins
Main agenda
Panel IAM meets IoT - Giving people, applications, services, and devices identity
more
  • Overcoming challenges of implementing IAM solutions
  • Increased enterprise risks of centralized IAM
12:40pm - 1:40pm 60 mins
Main agenda
Networking Lunch Break
1:40pm - 2:00pm 20 mins
Main agenda
Securing Smart Buildings of the Future
  • William Fitzgerald - Director of Global Product Security Technical Services, Johnson Controls
more
2:00pm - 2:20pm 20 mins
Main agenda
Utilizing blockchain as edge authentication security advancement
more
  • Smart contract, RFID, sensors, GPS and beyond
  • Supplier and raw material authentication already in deployment
2:20pm - 2:40pm 20 mins
Main agenda
Implementing Blockchain based asset authentication to enable IAM
more
  • What are the technical considerations to implement blockchain as device authentication methods
  • How does trust (or the lack of) between businesses effect the industry
2:40pm - 3:00pm 20 mins
Main agenda
Decentralized Cloud security: Preventing user data stored in the cloud being alternated and accessed by malicious actors
more
  • End – to – end encrypted, distributed object storage, where users have the sole accessed to their own data
3:00pm - 4:00pm 60 mins
Main agenda
Coffee Break & VIP Networking
4:00pm - 4:20pm 20 mins
Main agenda
Breaking Authentication on the Internet and Things
  • Aditya Balapure - Team Lead, Information Security, Grubhub
more

Authentication has been a major pillar that has determined the security health of the public web. Not surprisingly it has also been one of the most common targets of attackers and how they have grown as a community. As an industry, we have moved towards better privacy practices, encryption in transit and better authentication technologies but at the same time the attackers have constantly kept pace with these changes. In this presentation we’ll discuss how attackers have abused Transport Layer Security (TLS) certificate trust and are using more distributed ways including using botnets, IoT devices and cloud servers to target web authentication.

4:20pm - 4:40pm 20 mins
Main agenda
Exploring Multi factor authentication solutions & password management
more
  • Encryption, Password, Biometrics security management strategies
  • Improving strategies against social engineering, and phone number transfer and exploitation
  • Secure access to infrastructure and apps for privileged and end users
4:40pm - 5:00pm 20 mins
Main agenda
The Future of KYC - Mobile Identity & the Finance industry
more
  • Financial institutions are going to feel the impact of legislation throughout entire business model including managing KYC
5:00pm - 6:00pm 60 mins
Main agenda
Cocktail Hour