Hi [[ session.user.profile.firstName ]]

Internet of Things (IoT)

  • Date
  • Rating
  • Views
  • Consumer IoT: Concerns and Opportunities
    Consumer IoT: Concerns and Opportunities Informa Recorded: Apr 24 2017 2 mins
    Connected devices are taking over our daily lives. Over 40 million U.S. adults use wearables at least once a month. Around 33% of homeowners in the U.S. use Smart Home products. So, what is holding back consumers from taking the final leap and adopting the Internet of Things?

    The biggest challenges for the IoT adoption is customer perception that IoT devices are too expensive or are unsure of the benefits they provide. Privacy and security of IoT devices is also a cause for concern.

    How can your business overcome these obstacles to consumer IoT adoption? Learn how to jump the gap from early adopter buy-in to mass market success. Join the Internet of Things World 2017:

    * Use BRIGHT20 and save 20% off your IoT World 2017 registration.
  • Connectivity: The Key to IIoT Data Communications
    Connectivity: The Key to IIoT Data Communications Dr. Rajive Joshi, Principal Solution Architect, Real-time Innovations Inc. Recorded: Apr 5 2017 61 mins
    Connectivity: The Key to IoT Data Communications
    Unlocking Interoperability via the Industrial Internet Connectivity Framework

    From a practical viewpoint, IIoT components and subsystems are built at different times, by different teams, and in different places. In order to interoperate, they need to be able to communicate meaningfully. In order to communicate, the underlying connectivity infrastructure must facilitate the exchange of information between the participants.

    The Industrial Internet Connectivity Framework (IICF) is a comprehensive resource for understanding Industrial Internet of Things (IIoT) connectivity considerations. Developed by international connectivity experts, the IICF defines the minimum expectations required to build next generation IIoT systems with syntactic interoperability between components and subsystems.
  • #Vault7 Happened. There’s No Going Back. Now What?
    #Vault7 Happened. There’s No Going Back. Now What? Tony Busseri/Route1, Nick Bilogorskiy/Cyphort, Darin Andersen/CyberTECH, Jonathan Dambrot/Prevalent, James Carder/LogRhythm Recorded: Mar 22 2017 60 mins
    It's alleged that the CIA developed tools designed to spy on people, taking advantage of weaknesses in smart connected devices such as smart phones, smart TVs, smart personal assistants, and other household IoT technologies.

    In this discussion, we do a walk-through of what happened, what didn't happen, what systems and devices are impacted, and what data is involved in the leaks. Most importantly, we'll get some insight into what the larger societal impact of this could be.

    Join us for this in-depth conversation to learn:
    - Where stuff broke down.
    - Who is impacted, how are they impacted, and what’s at risk.
    - What the government can do to help.
    - What the commercial InfoSec community can do to help.
    - What consumers need to know to help (protect) themselves.

    Darin Andersen, Chairman & Founder, CyberTECH
    Nick Bilogorskiy, Sr. Director of Threat Operations, Cyphort
    Tony Busseri, CEO, Route1 Inc.
    Jonathan Dambrot, CEO & Co-Founder, Prevalent
    James Carder, CISO & VP of LogRhythm Labs

    Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
  • WikiLeaks Vault 7:  Facts, Fiction & Implications
    WikiLeaks Vault 7: Facts, Fiction & Implications Vince Tocce (Vince in the Bay), Jake Kouns (Risk Based Security), Kenesa Ahmad (WISP) Recorded: Mar 22 2017 61 mins
    Wikileaks recently published a throve of documents, "Vault 7 Year Zero", which they claim expose a wide-ranging hacking tools used by the Central Intelligence Agency (CIA). If true, these cyber-weapons include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. In some cases, it might use smart TVs and other IoT devices in cyber surveillance and espionage.

    Join this panel discussion and find out more about the Vault 7 leak:
    - Truth / Fiction
    - How likely are you to get hacked
    - Security and privacy implications
    - Long-term effect across the tech industry and its relationship with government agencies

    Vince Tocce a.k.a. Vince in the Bay

    Jake Kouns, CISO of Risk Based Security
    Kenesa Ahmad, Chair of Women in Security and Privacy (WISP)
  • What WikiLeaks Vault 7 Means for You and Your Organization
    What WikiLeaks Vault 7 Means for You and Your Organization Chenxi Wang, Jason Haddix, and Gaurav Banga Recorded: Mar 17 2017 61 mins
    WikiLeaks published thousands of CIA-related documents in March detailing the agency's cyber-espionage programs. WikiLeaks is calling the archive "Vault 7". Discover the facts behind the leaks and how they may affect you. Some of the industry's top cybersecurity experts will discuss what the Vault 7 leaks mean for organizations and industries, from a security and privacy perspective.

    Chenxi Wang, Founder, the Jane Bond Project
    Jason Haddix, Head of Security at Bugcrowd
    Gaurav Banga, Founder & CEO of a stealth mode cybersecurity startup
  • Why Critical Infrastructure Cybersecurity Is In a League of Its Own
    Why Critical Infrastructure Cybersecurity Is In a League of Its Own Paul Kurtz, CEO & Co-Founder, and Shimon Modi, Dir of Product & Technology at TruSTAR Technology Recorded: Mar 15 2017 45 mins
    It seems like it’s every other day the U.S. Government Accountability Office (GAO) is issuing a new critical infrastructure (CI) condemnation on a government agency or an intrepid security researcher is playing out what would happen to our electrical grid if a ransomware attack were to occur.

    But have we ever paused to consider exactly what it takes to protect critical infrastructure? In doing so, we can learn how to better protect ourselves.

    This session will highlight the similarities and differences of what it takes to protect critical infrastructure compared to the enterprise.

    Threat models are changing, which require a change in core capabilities necessary to protect CI. We’ll pull up some common tactics, techniques and procedures (TTPs) used in real world attacks using TruSTAR’s threat intelligence exchange platform to show how intelligence exchange can play a role in protecting CI in the future.

    This session will be led by Paul Kurtz, co-founder and CEO of TruSTAR Technology and former Senior Director for Critical Infrastructure Protection on the White House's Homeland Security Council (HSC), as well as Shimon Modi, Director of Product & Technology at TruSTAR and former Cybersecurity R&D Manager at Accenture Technology Labs, where he led the innovation strategy and build out of the Industrial IoT security capability.
  • The State of Cyber Defense in the Age of Hacks, Breaches and IoT
    The State of Cyber Defense in the Age of Hacks, Breaches and IoT Fred Wilmot (PacketSled), Usman Choudhary (ThreatTrack), Sushila Nair (NTT) Chris Roberts (Acalvio), Joseph Carson(Thycotic) Recorded: Mar 14 2017 64 mins
    Today, every organization is at risk of cyber attacks. It is no longer the question of if, but when. Attackers are motivated, sophisticated and not limited by national borders. With IoT devices increasing in adoption and becoming intrinsic elements in our smart city infrastructure, industrial control systems and transportation systems, improving cybersecurity is essential.

    Join this keynote panel and learn the latest trends in cyber attacks, hacks and breaches in an increasingly IoT world, and the recommendations on how to strengthen the security of our most critical assets.

    - Fred Wilmot, CTO of PacketSled

    - Usman Choudhary, Chief Product Officer at ThreatTrack
    - Chris Roberts, Chief Security Architect at Acalvio
    - Sushila Nair, Principal Consultant at NTT Security
    - Joseph Carson, Chief Security Scientist of Thycotic
  • Securing IoT: What Did We Learn From RSA 2017?
    Securing IoT: What Did We Learn From RSA 2017? Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor, Inc Recorded: Mar 3 2017 58 mins
    As the largest cybersecurity show on the earth, the RSA Conference always offers new products, insights and approaches to securing the latest connected devices. So with more Internet of Things (IoT) devices than ever before hitting the markets, what can be done to secure your corner of cyberspace. Let’s explore what we learned at the RSA Conference in San Francisco this year.

    About the Presenter:
    During his distinguished career, Dan Lohrmann has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Lohrmann joined Security Mentor, Inc. in August, 2014, and he currently serves as the Chief Security Officer (CSO) and Chief Strategist for this award-winning training company. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors.
  • Delivering Data Security with Hadoop and the IoT
    Delivering Data Security with Hadoop and the IoT Robert D. Schneider, Partner at WiseClouds LLC, Reiner Kappenberger, HPE Security - Data Security Recorded: Aug 9 2016 62 mins
    The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side the surge of new devices has increased potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

    Data security is a fundamental enabler of the IoT, and if it is not prioritised the business opportunity will be undermined, so protecting company data is more urgent than ever before. The risks are huge and Hadoop comes with few safeguards, leaving it to organizations to add an enterprise security layer. Securing multiple points of vulnerability is a major challenge, although when armed with good information and a few best practices, enterprise security leaders can ensure attackers will glean nothing from their attempts to breach Hadoop.

    In this webinar we will discuss some steps to identify what needs protecting and apply the right techniques to protect it before you put Hadoop into production.
  • How the IoT hype is changing an entire industry
    How the IoT hype is changing an entire industry Stefan Skarin, CEO, IAR Systems Recorded: Apr 13 2016 44 mins
    · IoT represents the biggest IT opportunity since decades. How to find the path of market or targeted audience?

    · The hype of IoT attracts a vast majority of new vendors, products and solutions. How to position, reposition your offering/message to find your niche and to be unique?

    · For a vendor of an end-to-end IoT solution there is a mix of business models to reach an one-stop-shop for the their customers. What could be of guidance in exploring new business models and what are the boundaries in making them successful RoI?

    · Is a “blue ocean strategy” a perfect concept to use for an IoT offering?

    · Much of IoT focus in offerings and media channels are consumer driven. How to make a consumer driven demand in a IoT B2B solution?

Embed in website or blog