Telecoms, Media & Technology is part of the Knowledge and Networking Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

8:00am - 8:50am 50 mins
Main agenda
Analyst Breakfast Roundtable Discussion

Leading analysts and experts will  host roundtable discussions around the general state of IoT Security, where attendees can ask questions and network with fellow security professionals. Come early and join the discussion

8:50am - 9:00am 10 mins
Main agenda
Chairman's Opening Remarks
  • Patrice Samuels - Senior Analyst, Parks Associates
9:00am - 9:20am 20 mins
Main agenda
Securing IoT with a New Paradigm
  • Ritesh Agrawal - Sr. Director, Security Specialist SE, Juniper Networks
  • Be Ready for Cloud, 5G and IoT with Advanced Security Acceleration 
    • Identity and Policy Control
    • Network edge services
    • Network management
    • Network Operating System
    • Software defined networking 
    • Securing Wireless switches, routers
9:20am - 9:40am 20 mins
Main agenda
The State of Identity and Access Management IAM - What Can IoT Learn from the Loan Market
  • Anand Sigh - CISO & VP, Caliber Home Loans
  • What data do finance companies use to determine eligibility to borrow and how technology can help evolve and improve the approval process of home loan borrowing
  • Identity and access management (IAM) can be provided as a service in the cloud 
  • Identity and access management (iam) beyond compliance 
  • Identity and access management (iam) user guide 
  • Identity and access management (iam) for AWS, Azure and beyond 
9:40am - 10:00am 20 mins
Main agenda
Creating Solutions for Secure IoT Security by Design
  • Arjmand Samuel - Security Lead and Principal Program Manager, Microsoft

Learn about Internet of Things (IoT) security and important steps you can take to build secure solutions that help protect your vital business assets.

  • Security by design principles 
  • Security by design considering GDPR
10:00am - 10:40am 40 mins
Main agenda
Panel: IoT Security Strategy: Aligning Cybersecurity and 3rd Party Risk Management with Traditional Business Frameworks
  • Adi Pradeep - Cybersecurity Analyst, Southwest Airlines
  • How to evaluate the security of IoT platforms?
  • How much security do I need and how much should I be willing to pay for it?
  • 3rd party risk management & blindspots created as a result; proactive vs reactive security
  • Use Case: Airline Industry and Aviation Security - Risk Management: Vulnerability Management in on-prem

Interested in speaking on this topic or do you have other ideas?

Let us know by submitting a speaking proposal today!

10:40am - 11:30am 50 mins
Main agenda
Coffee Break & Expo Hall Visit
11:40am - 12:00pm 20 mins
Main agenda
Enabling your business to identify and mitigate the intrinsic risk in your operations, supply chains and business processes
  • Intertek . - ., Intertek
  • Evaluating how your products and services meet and exceed quality, safety, sustainability and performance standards. 
  • Validating the specifications, value and safety of your raw materials, products and assets. 
  • Formally confirming that your products and services meet all trusted external and internal standards.
12:00pm - 12:40pm 40 mins
Main agenda
Panel: IAM meets IoT - Giving People, Applications, Services, and Devices Identity
  • Brian Guthrie - Identity and Access Program Manager, 7 Eleven
  • Christopher Caen - Researcher, Independent
  • Srini Nimmagadda - Director, Product Management – Secure Networks, Juniper Networks
  • Tom Plunkett - Consulting Solutions Director, Oracle Consulting
  • Manage your device identity and protected content
  • Overcoming challenges of implementing IAM solutions
  • Increased enterprise risks of centralized IAM
  • device identity management
12:40pm - 1:40pm 60 mins
Main agenda
Networking Lunch Break
1:40pm - 2:00pm 20 mins
Main agenda
People Management as IoT Security Challenge: Preventing Employees Causing Damaging Data Breaches - Assembling a Global Red and Blue Team
  • Alexandra Heckler - Cyber Strategy Consultant, Booz Allen Hamilton
  • Assembling a Red team for cyber security incident management
  • Red team testing strategies and technologies
  • Red team pentesting - value, benefits, challenges

Interested in speaking on this topic or do you have other ideas?

Let us know by submitting a speaking proposal today!

2:00pm - 2:20pm 20 mins
Main agenda
Blockchain for Internet of Things Security - Utilizing Blockchain as Edge Authentication Security Advancement
  • Abhi Dugar - Director, Cloud Infrastructure and IoT Security, IDC

This IDC study examines the applicability of blockchain technology to secure Internet of Things (IoT) implementations. In this Technology Assessment essential blockchain concepts are explored in the context of IoT, including types of consensus models, smart contracts, and what aspects of blockchain technology are attractive for IoT and why. IoT-specific efforts by blockchain-focused consortiums and standards organizations are highlighted, and use cases are discussed for the applicability of blockchain technology to IoT. The study also discusses limitations that must be considered in the adoption of blockchain technology for IoT security. "IDC believes that providing security and trust for IoT use cases requires new solutions and approaches that go beyond traditional techniques used in typical IT environments. In this respect, the fundamental concepts behind blockchain technology are quite powerful, offering compelling features to secure IoT applications, networks, and devices. Blockchain technology is developing and evolving rapidly to support the unique requirements and needs of IoT applications and will find use across industry verticals." — Abhi Dugar, research director, IoT Security, IDC

2:20pm - 2:40pm 20 mins
Main agenda
Fireside Chat: Implementing Blockchain Based Asset Authentication to Enable IAM
  • Jo Peterson - VP of Cloud, Clarify360
  • Mike Goodenough - Chief Architect of IAM Cloud & Data Security, Cognizant
  • What are the technical considerations to implement blockchain as device authentication methods
  • Authentication vs Authorization - what can we do with blockchain?

2:40pm - 3:00pm 20 mins
Main agenda
Risk Management in the Aviation and Airline Industry
  • Adi Pradeep - Cybersecurity Analyst, Southwest Airlines

Vulnerability Management in on-prem & cloud as well as other areas I have knowledge in related to Risk Management, Security Policies

3:00pm - 4:00pm 60 mins
Main agenda
Coffee Break & VIP Speed Networking

Speed Networking is your opportunity to network with security professionals through a series of 1 on 1, three minute introductions. Collect business cards, make contacts, and have in the process. Located on the expo floor, this is a buzz worthy event you don't want to miss


4:00pm - 4:20pm 20 mins
Main agenda
Breaking Authentication on the Internet and Things
  • Aditya Balapure - Team Lead, Information Security, Grubhub

Authentication has been a major pillar that has determined the security health of the public web. Not surprisingly it has also been one of the most common targets of attackers and how they have grown as a community. As an industry, we have moved towards better privacy practices, encryption in transit and better authentication technologies but at the same time the attackers have constantly kept pace with these changes. In this presentation we’ll discuss how attackers have abused Transport Layer Security (TLS) certificate trust and are using more distributed ways including using botnets, IoT devices and cloud servers to target web authentication.

4:20pm - 4:40pm 20 mins
Main agenda
Keeping Up With IoT Security: An Understanding of the Growth of IoT Security Market Outlook ad Talent Development
  • Jim McGinnis - Assistant Professor, Herff College of Engineering at the University Memphis in Memphis TN
  • Growth of IoT Security Market: Issues and Solutions
  • The University of Memphis' perspective of raising the next generation of security engineering talent to fulfill the job market growth
  • Seeking alignment between the market growth outlook and talent development
4:40pm - 5:00pm 20 mins
Main agenda
Security in the IoT World
  • Sean Bryson - Vice President, Solutions and Innovation, Hitachi Consulting
  • Think beyond things: IoT that drives outcomes 
  • Review of the results we've achieved – in areas including cities, transport, retail, healthcare, heavy industry and energy – show how true partnerships and wider ecosystems can find new answers to extremely complex challenges.

Let us know by submitting a speaking proposal today!

5:00pm - 6:00pm 60 mins
Main agenda
Cocktail Hour - Join us for Some Fun Networking with Security Professionals and Juniper Networks, Microsoft, TrendMicro, Intertek, Linx