Hi [[ session.user.profile.firstName ]]

Internet of Things (IoT)

  • Date
  • Rating
  • Views
  • Your Car Is Betraying You -- Why Robust Security is Essential on the Road
    Your Car Is Betraying You -- Why Robust Security is Essential on the Road Toby Weir-Jones, CEO, Weir-Jones and Associates Recorded: Jun 22 2017 58 mins
    Modern vehicles are, as Bruce Schneier recently put it, actually computers with wheels rather than cars with a computer added on. Every part of the vehicle's operation is supervised, logged, and managed by digital signals on a complex vehicle network. If you have a crash, your car will tell investigators if you were speeding or swerved to avoid the impact. If you spend too long dawdling at the convenience store instead of visiting your customers, your employer will know about it. If you waste fuel, drive dangerously, or don't turn your lights on when you should, it'll be recorded.

    This introduces a lot of familiar debates in security circles. Who owns the data? What counts as personally identifiable? What are acceptable standards for logging, retention, and disclosure? What happens if we get it wrong?

    The bad news is the vehicle landscape, like enterprise security, is badly fragmented. The good news is we've learned a lot of useful lessons over the past 20 years which can be brought to bear on the problem, so solving it shouldn't take another 20.

    In this presentation we'll review some of the mechanics of how vehicle data is generated, who can see it, and how it can be used and abused. We'll then talk about points of leverage for the industry, the manufacturers, the owners, and law enforcement, and see what common ground exists. Finally, we'll lay out some basic ideas any fleet operator or concerned individual can use to make decisions about what vehicles to use and how to manage the data footprints they generate.
  • Building Secure Vehicular Software
    Building Secure Vehicular Software Dr. Mark Sherman, Technical Director, CERT / Software Engineering Institute, Carnegie Mellon University Recorded: Jun 22 2017 36 mins
    Software plays an expanding and critical role in the success of future vehicles such as automobiles and trucks. Novel technologies that depend on the flexibility of software create new vulnerabilities and new ways to attack systems. This talk explores the expanding landscape of vulnerabilities that accompany the increasing reliance on software and then examines some key steps to help mitigate the increased risk: development of appropriate requirements from an analysis of risks, techniques that can be applied during development, and evaluation approaches for existing systems. The talk will conclude with a view of emerging approaches to further improve the delivery and sustainment of such critical software.

    About the Presenter:
    Dr. Mark Sherman is the Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. His team focuses on foundational research on the life cycle for building secure software and on data-driven analysis of cyber security. Before coming to CERT, Dr. Sherman was at IBM and various startups, working on mobile systems, integrated hardware-software appliances, transaction processing, languages and compilers, virtualization, network protocols and databases. He has published over 50 papers on various topics in computer science.
  • Panel: Smart Fog and Transaction Management for Cities and Maritime
    Panel: Smart Fog and Transaction Management for Cities and Maritime Moderator: Katalin Walcott (Intel) Panel: Jeff Fedders (OpenFog), Mark Dixon (IBM), Matthew Bailey (Powering IoT) Recorded: Jun 22 2017 61 mins
    Fog computing represents a tectonic shift for the future of transaction management, distributed supply chain and overall experience. It blurs the lines between the edge and the cloud and puts the focus on the systems which manage and balance the delivery of coherent, end-to-end sessions and associated transaction level agreements. As a result, this new technology is pervasive in several industries.

    Join this panel of experts as they discuss solutions with specific industry use cases from smart fog for Cities, Buildings, Ports, and Maritime.

    Moderator: Katalin Walcott, Work Group Chair Manageability at OpenFog Consortium & Principal Engineer - IoT/Fog Computing Orchestration Architecture at Intel

    Panelists:
    - Jeff Fedders, President at OpenFog Consortium & Chief Strategist, IoTG Strategy and Technology Office at Intel
    - Mark Dixon, Senior Architect for Smarter Cities at IBM
    - Matthew Bailey, President, Powering IoT - Smart City advisor and strategist to governments, technology corporations, and economic development agencies
  • Clearing the Fog Around IoT Analytics
    Clearing the Fog Around IoT Analytics Jason Stamper, Data Platforms and Analytics Analyst, 451 Research Recorded: Jun 22 2017 38 mins
    In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.

    He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.
  • Why Vendor Liability is Necessary to Secure Consumer IoT
    Why Vendor Liability is Necessary to Secure Consumer IoT Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc. Recorded: Jun 21 2017 55 mins
    We live in an IoT world. Connected devices now include TVs, refrigerators, security systems, phones, music players, smart assistants, DSL modems, cars, and even toothbrushes. Besides privacy and personal security concerns, these devices pose significant risk of cyber attacks. IoT devices have been used in devastating DDoS attacks that have paralyzed key Internet services, emergency services, and heating systems. In addition to run-of-the-mill hackers and hacktivists, they are the first line of attack in any low-to-medium scale cyber conflict between nation states.

    Vulnerable IoT devices represent a direct threat to safety, life, property, business continuity, and general stability of the society.

    This talk will discuss the security challenges surrounding IoT devices, and what is needed for a balanced framework that forces vendors to implement a reasonable level of best practice without causing them undue burden and risk.

    About the Presenter:
    Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.
  • Smart Cities from the systems point of view
    Smart Cities from the systems point of view Dr Alexander Samarin, Enterprise & Solution Architect, Business & IT Transformation, BPM & SOA Coach, Recorded: Jun 16 2017 49 mins
    Smart Cities is one of the essential endeavours right now. Smart Cities use many existing and emerging information technologies, Smart Cities must change lives of many people and each Smart Cities programme and project is a daunting task. Therefore Smart Cities must be considered as a system which perfectly delivers its desired capabilities.

    This presentation will discuss how several modern techniques, such as systems approach, standardisation, reference architecture, patterns, explicit security, can be combined to enable world-wide cooperation and coordination in delivery of various Smart Cities.

    Speaker's bio:

    Alexander Samarin wrote his first software program in the year 1973. He obtained a PhD (in computer graphics) in the year 1986. He has worked for a variety of international clients in Switzerland, UK, France, Australia and Africa. He specialises in architecture, implementation and evolution of enterprise-wide solutions with the holistic use of enterprise architecture, business architecture, BPM, SOA, ECM, IT governance and IT strategy. In October 2009 he published a book “Improving enterprise business process management systems”. Since August 2013 he works as an architect for achieving the synergy between strategy, good business practices and disruptive digital technologies for digital systems.
  • Transitioning IoT Infrastructure: From Networks of People to Networks of Things
    Transitioning IoT Infrastructure: From Networks of People to Networks of Things Christian Renaud, Research Director, Internet of Things, 451 Research Recorded: Jun 15 2017 33 mins
    Networks are changing. With the vast expansion of IoT, we're experiencing the transition of enterprise and operator infrastructure from networks of people to networks of people, places and things.

    Join Christian Renaud, Research Director, IoT at 451 Research, as he looks at the impacts of the growing number of instrumented environments and objects on enterprise and carrier networks, capacities, signaling protocols, and emerging opportunities for value creation beyond simple connectivity.

    This webinar will cover:
    - Possible bottlenecks and roadblocks on the path to the Internet of Things
    - What leading organizations are doing today to prepare for the coming influx of new types of devices
  • Cloud Customer Architecture for IoT
    Cloud Customer Architecture for IoT Gopal Indurkya, Executive IT Architect, IBM and Eric Libow, CTO, Watson IoT Connected Products, IBM Recorded: Jun 15 2017 55 mins
    The Internet of Things (IoT) is one of the most exciting and dynamic areas of IT at the present time. IoT involves the linking of physical entities (“things”) with IT systems that derive information about or from those things which can be used to drive a wide variety of applications and services. IoT covers a very wide spectrum of applications, spanning enterprises, governments and consumers and represents the integration of systems from traditionally different communities: Information Technology and Operational Technology. As a result, it is important for IoT systems to have architectures, systems principles, and operations that can accommodate the interesting scale, safety, reliability, and privacy requirements. Attend this webinar to hear best practices for supporting the Internet of Things (IoT) using cloud computing.
  • The Future of Agile Network Architectures & IoT Connectivity
    The Future of Agile Network Architectures & IoT Connectivity Ahmed Banafa, Ryan Allphin, and Brenda Boehm Recorded: Jun 15 2017 59 mins
    The Internet of Things is upon us. Vast amounts of big data are quickly approaching and network traffic, latency and bandwidth are at higher demands than ever. Storing, transmitting, and analyzing this data from IoT devices will require a secure and agile network architecture. Network failover and network security will be of the utmost importance.

    How will these changes in demand and technologies have an impact on new standards and protocols? Will network communications between devices and the cloud be safe? Tune into this dynamic panel discussion with leading IoT and network experts for the state of IoT networks.

    Panelists:
    Ahmed Banafa, SJSU Faculty Member and LinkedIn IoT Influencer
    Ryan Allphin, CTO, Cradlepoint
    Brenda Boehm, Chief Strategy Officer & Board Advisor, IoT Smart Solutions, TIA
  • Best practice guidelines and IoT network security compliance
    Best practice guidelines and IoT network security compliance Richard Marshall, Plenary Chair at Internet of Things Security Foundation Recorded: Jun 15 2017 46 mins
    The IoT represents a significant challenge for companies new to supplying connected products and in particular the associated security implications. Traditionally security was often seen as something that was firmly in the domain of the IT or related department. However, with IoT systems being dependant upon a variety of sensors and embedded devices, the impact of supplying secure IoT products spans the whole of the company business; from the supply chain to how an organisation handles vulnerability disclosure. This session will go through some of the challenges that face businesses delivering secure IoT products and the guidance available to help companies take secure IoT products to market and having launched them, ensuring that they are able to support them from a security perspective.

Embed in website or blog