Hi [[ session.user.profile.firstName ]]
Sort by:
    • What's Needed to Secure the IoT & IIoT
      What's Needed to Secure the IoT & IIoT Mark Weatherford (vArmour) | Robert M. Lee (Dragos) | Jennifer Minella (Carolina Advanced Digital) Upcoming: Jun 12 2018 5:30 pm UTC 60 mins
    • Internet of Things devices are built with cost & convenience in mind, not security. This makes them easy targets for cybercriminals looking to exploit their vulnerabilities and infiltrate your systems. With IoT adoption on the rise, organizations are looking for ways to improve security at all levels and limit the damage IoT-powered cyber attacks can cause. The stakes are even higher for the Industrial Internet of Things (IIoT).

      Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
      - IoT as a gateway to your systems
      - Key factors for building a successful security strategy encompassing the IoT & IIoT
      - Threats targeting the IoT / IIoT
      - Industrial threat detection and response
      - Recommendations for improving security

      Speakers:
      - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
      - Robert M. Lee, CEO, Dragos
      - Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital

      Read more >
    • Connectivity: The Key to IIoT Data Communications
      Connectivity: The Key to IIoT Data Communications Dr. Rajive Joshi, Principal Solution Architect, Real-time Innovations Inc. Recorded: Apr 5 2017 5:00 pm UTC 61 mins
    • Connectivity: The Key to IoT Data Communications
      Unlocking Interoperability via the Industrial Internet Connectivity Framework

      From a practical viewpoint, IIoT components and subsystems are built at different times, by different teams, and in different places. In order to interoperate, they need to be able to communicate meaningfully. In order to communicate, the underlying connectivity infrastructure must facilitate the exchange of information between the participants.

      The Industrial Internet Connectivity Framework (IICF) is a comprehensive resource for understanding Industrial Internet of Things (IIoT) connectivity considerations. Developed by international connectivity experts, the IICF defines the minimum expectations required to build next generation IIoT systems with syntactic interoperability between components and subsystems.

      Read more >
    • Advances in IIoT Made Possible by Innovations in 5G, Virtualization & the Cloud
      Advances in IIoT Made Possible by Innovations in 5G, Virtualization & the Cloud Paul Parker-Johnson from ACG Research, Ken Hosac from Cradlepoint, Dave Nowoswiat from Nokia & Prodip Sen from HPE Recorded: May 31 2017 6:50 pm UTC 68 mins
    • An ACG Analysis, Research Brief and Webinar Developed in Partnership with RCR Wireless. Concurrent innovations in 5G radio access and in network control and application delivery using virtualization and the cloud at multiple layers of the ‘stack’ will bring services to market not feasible in the past. This fortunate combination makes the arrival of 5G especially inspiring. Evaluating several of the more impactful new radio access innovations, the way they benefit from virtualization and the cloud in managing the network and and delivering new applications, and examining the benefits these enhancements bring to stakeholders in the 5G and IIoT ecosystems is the focus of this research.

      One area of innovations in 5G and IIoT is to support a massive scale of connectivity for ‘things’ for commercial and industrial use. In many cases use of low power access technologies such as LoRa is integral to supporting new applications at scale. In other cases innovative data distribution mechanisms such as Coordinated Multi-Point communications (or CoMP) to support the use of diverse types of end-stations are crucial to bringing the versatility, efficiency and scale to IIoT that some applications need. In parallel support for highly reliable and ultra-low latency communication for applications in transportation, health care, public safety and other vertical sectors will harness new frequency bands and transmission management techniques to accomplish their functions.

      This research brief and webinar from ACG Research will examine the symbiosis between 5G radio access innovations and the technologies of virtualization and the cloud for delivering IIoT at scale in ways that have not been possible in the past.

      Read more >
    • Industrial Internet Security in Action -- Interoperable IIoT Event Monitoring
      Industrial Internet Security in Action -- Interoperable IIoT Event Monitoring Terrence Barr, Electric Imp; Nisarg Desai, Globalsign; Andrew Ginter, Waterfall Security Solutions Recorded: Apr 18 2017 5:00 pm UTC 62 mins
    • Industrial Internet Security in Action --
      Interoperable IIoT Security Event Monitoring
      (Inlcuding a preview of security interop demo at Hannover Messe)

      With the rise of the Industrial Internet of Things and Industrie 4.0, manufacturers are adding more connected devices and sharing operation data with IT systems within their own factories and businesses, and they are extending information exchange across their entire value chain. This increased digitization offers a host of benefits to businesses, partners, suppliers and customers. But such connectivity must not itself put sensitive equipment at risk. Security is important within a single manufacturers’ plants, and across every participant in the value chain. Since there is no single, homogeneous security environment, multiple companies and systems that need to work together.

      JOIN THE WEBINAR TO LEARN:
      -How a strong Identity and Root-of-Trust forms the foundation of IoT Security

      -How to securely connect systems from the operational domain (OT), to become more accessible to the information technology (IT) domain.

      -How to implement end-to-end security from device to cloud

      -How 24 IIC Members will demonstrate secure, interoperable IIoT event monitoring at Hannover Messe

      Read more >
    • What is the Best Connectivity Solution for Your IIoT Systems?
      What is the Best Connectivity Solution for Your IIoT Systems? Andrew Watson, OMG; Angelo Corsaro, PrismTech; Gerardo Pardo-Castellote, RTI; Nina Tucker, Twin Oaks Computing Recorded: Feb 22 2017 4:00 pm UTC 60 mins
    • Today's computing infrastructure is changing dramatically to support new requirements in design and structure. This is no more evident than in the Internet of Things, where new types of machines driven by vast, complex industrial, distributed systems, can’t operate without connectivity. These new machines will transform our infrastructure into smart freeways, distributed power generation and autonomous driving cars, etc., revolutionizing the workplace and our lives for years to come.

      These new IoT systems need data-centric technology that directly addresses real-time systems to explicitly manage the communications “data model.” No matter what application – from financial trading platforms, to medical devices, to smart electrical grids, to exploration and production and to transportation – industries need solutions to find right data then communicates it to its intended destination in a reliable, flexible, fast, and secure manner.

      To learn more about the proven standard for data-connectivity in mission- and business-critical systems join OMG's webinar featuring experts from the leading DDS middleware vendors; PrismTech, RTI and Twin Oaks Computing

      Read more >
    • Bridging The IT/OT Security Gap
      Bridging The IT/OT Security Gap Chris Grove Recorded: May 10 2018 1:40 am UTC 73 mins
    • Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber-security threats even more difficult to detect, investigate and remediate.

      Read more >
    • Security-Enabling Industrial IoT – What Are the Challenges?
      Security-Enabling Industrial IoT – What Are the Challenges? Oliver Pfaff, Principal Key Expert at Siemens Upcoming: Jun 12 2018 12:00 pm UTC 60 mins
    • Security is an important aspect of IoT and especially Industrial IoT systems (short: IIoT). It is not yet fully championed as shown by a number of incidences which became publicly known.

      One particular facet of the IIoT security challenge is given by the fact that widely used security solutions from the IT domain cannot be just copied-and-pasted to IIoT – due to differences in given constraints and needs.

      Join this webinar presentation to learn more about:
      - The IIoT security challenge
      - In-depth look into the architectural approaches to IIoT Security
      - Emerging solutions, as well as standards for IIoT security

      About the Speaker:
      Oliver Pfaff is a Principal Key Expert at Siemens, serving the technology field IT-Security at Corporate Technology. Oliver’s work concerns security in distributed systems. Oliver‘s current projects address the security-enabling of Industrial Internet-of-Things as well as Operational Technology systems and products.

      Read more >
    • DDS Technical Overview Part III - Using DDS to Secure Data Communications
      DDS Technical Overview Part III - Using DDS to Secure Data Communications Larry Johnson, OMG; Nina Tucker, Twin Oaks Computing; Gerardo Pardo-Castellote, RTI; Angelo Corsaro, PrismTech Recorded: Nov 16 2017 4:00 pm UTC 53 mins
    • Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as, Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.

      To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group offers this DDS technical oveview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.

      This webinar, Part III of the OMG DDS Webinar series, will take an in-depth look at the latest advances in the DDS standards to meet the demanding cyber-security requirements of today’s industrial connected systems. From authentication and access control to integrity and encryption, learn how to leverage DDS Security features to secure your connected system against cyber attacks, while maintaining a flexible, scalable architecture. Presented by Nina Tucker, Vice President of Twin Oaks Computing.

      Part I of the OMG DDS Webinar Series: Introduction to DDS and Key Abstractions presented by Angelo Corsaro, Ph.D., of ADLink Technologies and co-chair of OMG's DDS Special Interest Group, is available here: https://www.brighttalk.com/webcast/12231/252365

      Part II of the OMG DDS Webinar series: Applying DDS QoS to Solve Real-World Problems, presented by Gerardo Pardo-Castellote, Ph.D., CTO of RTI and Co-Chair of OMG's DDS Special Interest Group, is available here: https://www.brighttalk.com/webcast/12231/252387

      Read more >
    • Securing the Transforming Industrial Environment
      Securing the Transforming Industrial Environment Ronen Shpirer, Security Solutions Architect, Fortinet Upcoming: May 29 2018 9:00 am UTC 60 mins
    • IoT, IIoT, OT... It is likely that for many of us these acronyms are confusing. The fact is that traditional industrial environments, such as utilities and production, have started a digital transformation process which harness these and other technologies to become more efficient, automated and competitive.

      Within this transformation from a well-defined and well-controlled industrial ecosystem to a dynamic and open one, lurks a shift in the security challenges, needs and solutions/architecture.

      This session will focus on the technologies and challenges digital transformation introduces in industrial environments and how Fortinet’s Security Fabric is deployed in such an environments to provide the required security infrastructure and posture, including demonstration of some simplified use cases.

      Read more >
    • DDS Technical Overview Part II - Applying DDS QoS to Solve Real World Problems
      DDS Technical Overview Part II - Applying DDS QoS to Solve Real World Problems Larry Johnson, OMG; Nina Tucker, Twin Oaks Computing; Gerardo Pardo-Castellote, RTI; Angelo Corsaro, PrismTech Recorded: Sep 14 2017 3:00 pm UTC 60 mins
    • Introduced in 2004, the Data Distribution Service has developed into a mature and proven connectivity standard within the IIoT. Today, DDS is at the heart of a large number of mission- and business-critical systems such as Air Traffic Control and Management, Train Control Systems, Energy Production Systems, Medical Devices, Autonomous Vehicles, and Smart Cities. Considering the technological trends towards data-centricity and the rate of adoption, tomorrow DDS will be at the heart of an incredible number of Industrial IoT (IIoT) systems.

      To help you become an expert in DDS and expand your skills in the growing DDS market, Object Management Group offers this DDS technical overview webinar series covering three key areas: (1) the essence of DDS and data-centric systems, (2) how to effectively exploit DDS Quality of Service to build applications that perform and scale, and (3) securing your distributed DDS system.

      This webinar, Part II of the OMG DDS Webinar series, will cover in detail the mechanisms available in DDS to meet challenging real-world application requirements; from discovery to state management, information consistency, data durability, reliability and scalable information distribution. With over 20 different quality-of-service (Qos) policies DDS provides ready-made configurable patterns that can be used to meet most of these use-cases. Learn to leverage DDS Qos and patterns to simplify your application code and increase the robustness of your system. Presented by Gerardo Pardo-Castellote, Ph.D., CTO of RTI and Co-Chair of OMG's DDS Special Interest Group.

      Part I: Introduction to DDS and Key Abstractions presented by Angelo Corsaro, Ph.D., of ADLink Technology and co-chair of OMG's DDS Special Interest Group, is available here https://www.brighttalk.com/webcast/12231/252365

      Part III: Using DDS to Secure Data Communications presented by Nina Tucker, Vice President of Twin Oaks Computing here: https://www.brighttalk.com/webcast/12231/252391

      Read more >