Hi [[ session.user.profile.firstName ]]

Delivering Data Security with Hadoop and the IoT

The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side the surge of new devices has increased potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

Data security is a fundamental enabler of the IoT, and if it is not prioritised the business opportunity will be undermined, so protecting company data is more urgent than ever before. The risks are huge and Hadoop comes with few safeguards, leaving it to organizations to add an enterprise security layer. Securing multiple points of vulnerability is a major challenge, although when armed with good information and a few best practices, enterprise security leaders can ensure attackers will glean nothing from their attempts to breach Hadoop.

In this webinar we will discuss some steps to identify what needs protecting and apply the right techniques to protect it before you put Hadoop into production.
Recorded Aug 9 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Robert D. Schneider, Partner at WiseClouds LLC, Reiner Kappenberger, HPE Security - Data Security
Presentation preview: Delivering Data Security with Hadoop and the IoT

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Connectivity: The Key to Powering IoT Healthcare Innovation Dec 31 2017 6:00 pm UTC 60 mins
    Tom Rose, Director of Business Development, IoT Solutions, KORE
    Without connectivity, healthcare innovation powered by IoT is more idea than actuality. Drivers of healthcare innovation include increased public health expenditures, growing aging population and the prevalence of chronic disease, and the challenges of lack of funding and patient retention. Healthcare innovation can address these challenges with IoT such as the instrumentation of things, the instrumentation of places, patient monitoring and remote healthcare delivery.

    In this webinar, experts in the field of healthcare IoT will discuss:

    * The benefits of IoT in healthcare
    * Example use cases demonstrating this innovation
    * How to implement connected solutions to power innovation
    * How data flows between devices, to the cloud, and to enterprise systems can be achieved
    * How Kore powers mHealth Solutions

    Sign up for this 60-minute webinar today and gain valuable insights into building an effective IoT strategy within healthcare

    Guests:
    Tom Rose, Director of Business Development, IoT Solutions, KORE
    Marie Finnegan, Principal Portfolio Marketing Specialist, Allscripts


    Moderator:
    Rachael Brownell, Webinar Manager, ReadWrite

    Brought to you by; KORE and ReadWrite
  • 2017 Trends in IoT Cyber Attacks Sep 13 2017 4:15 pm UTC 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    There is a need to protect your Internet of Things (IoT) devices from unknown vulnerabilities. The Gartner IoT Market guide provides insightful recommendations security professionals should take when considering an IoT security vendor. This session will discuss the key findings.
    Viewers will learn:
    • Current trends in Cyber attacks for IoT
    • Security Metrics for IoT
    • Oversight of third parties in IoT
    • How to measure cybersecurity preparedness for IoT
    • Automated approaches to integrate Security into IoT
  • The Data Cities Collect and Your Transportation Future Jun 23 2017 9:00 pm UTC 45 mins
    Laura Schewel, CEO, StreetLight Data
    From automated vehicles to ride hailing apps, transportation as we know it is changing - and fast. But new technologies alone won't help communities build the efficient, equitable, and sustainable transportation networks communities want. In fact, these innovative technologies could do just the opposite, especially if they are not deployed wisely. Cities must collect the right data and enact the right policies to ensure they do not exacerbate problems like inequity and traffic, and to hold themselves accountable to the promise of new mobility technologies.

    In this webinar, you will find out why - and how - the smartest cities of tomorrow will be those that adopt data-driven transportation strategies today. Join for Laura Schewel's presentation to gain insights into:

    • Why the status quo for transportation data collection is no longer good enough
    • The types of Massive Mobile Data that are useful for transportation and urban planning
    • Algorithmic processing techniques that are critical for making this data useful
    • Case studies from California and Virginia that demonstrate why Massive Mobile Data drives more effective transportation planning
    • A forward-looking blueprint for using Massive Mobile Data to maximize the potential benefits of new transportation technologies - and minimize negative impacts

    Laura Schewel founded StreetLight Data, a mobility analytics provider, after spending more than a decade as an advanced transportation researcher and statistician at the Rocky Mountain Institute and FERC. She has particular expertise in transportation systems, sustainability and safety, and vehicle/system modeling and analysis.
  • How IoT Will Make Healthcare Healthy, Wealthy, & Wise Jun 23 2017 5:00 pm UTC 45 mins
    Jarie Bolander, COO, Lab Sensor Solutions
    IoT is a technology that has the potential to make us healthy, wealthy, and wise especially in healthcare. Healthcare is just now adopting IoT to improve patient outcomes and decrease the cost of care.

    In this webinar, you’ll learn:

    - How to identify if an IoT solution will work for your use case.
    - What others in healthcare are using IoT for.
    - The challenges of IoT in healthcare
  • Your Car Is Betraying You -- Why Robust Security is Essential on the Road Jun 22 2017 9:00 pm UTC 60 mins
    Toby Weir-Jones, CEO, Weir-Jones and Associates
    Modern vehicles are, as Bruce Schneier recently put it, actually computers with wheels rather than cars with a computer added on. Every part of the vehicle's operation is supervised, logged, and managed by digital signals on a complex vehicle network. If you have a crash, your car will tell investigators if you were speeding or swerved to avoid the impact. If you spend too long dawdling at the convenience store instead of visiting your customers, your employer will know about it. If you waste fuel, drive dangerously, or don't turn your lights on when you should, it'll be recorded.

    This introduces a lot of familiar debates in security circles. Who owns the data? What counts as personally identifiable? What are acceptable standards for logging, retention, and disclosure? What happens if we get it wrong?

    The bad news is the vehicle landscape, like enterprise security, is badly fragmented. The good news is we've learned a lot of useful lessons over the past 20 years which can be brought to bear on the problem, so solving it shouldn't take another 20.

    In this presentation we'll review some of the mechanics of how vehicle data is generated, who can see it, and how it can be used and abused. We'll then talk about points of leverage for the industry, the manufacturers, the owners, and law enforcement, and see what common ground exists. Finally, we'll lay out some basic ideas any fleet operator or concerned individual can use to make decisions about what vehicles to use and how to manage the data footprints they generate.
  • Building Secure Vehicular Software Jun 22 2017 5:00 pm UTC 60 mins
    Dr. Mark Sherman, Technical Director, CERT / Software Engineering Institute, Carnegie Mellon University
    Software plays an expanding and critical role in the success of future vehicles such as automobiles and trucks. Novel technologies that depend on the flexibility of software create new vulnerabilities and new ways to attack systems. This talk explores the expanding landscape of vulnerabilities that accompany the increasing reliance on software and then examines some key steps to help mitigate the increased risk: development of appropriate requirements from an analysis of risks, techniques that can be applied during development, and evaluation approaches for existing systems. The talk will conclude with a view of emerging approaches to further improve the delivery and sustainment of such critical software.

    About the Presenter:
    Dr. Mark Sherman is the Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. His team focuses on foundational research on the life cycle for building secure software and on data-driven analysis of cyber security. Before coming to CERT, Dr. Sherman was at IBM and various startups, working on mobile systems, integrated hardware-software appliances, transaction processing, languages and compilers, virtualization, network protocols and databases. He has published over 50 papers on various topics in computer science.
  • Panel: Smart Fog and Transaction Management for Cities and Maritime Jun 22 2017 5:00 pm UTC 60 mins
    Moderator: Katalin Walcott (Intel) Panel: Jeff Fedders (OpenFog), Mark Dixon, (IBM)
    Fog computing represents a tectonic shift for the future of transaction management, distributed supply chain and overall experience. It blurs the lines between the edge and the cloud and puts the focus on the systems which manage and balance the delivery of coherent, end-to-end sessions and associated transaction level agreements. As a result, this new technology is pervasive in several industries.

    Join this panel of experts as they discuss solutions with specific industry use cases from smart fog for Cities, Buildings, Ports, and Maritime.

    Moderator: Katalin Walcott, Work Group Chair Manageability at OpenFog Consortium & Principal Engineer - IoT/Fog Computing Orchestration Architecture at Intel

    Panelists:
    - Jeff Fedders, President at OpenFog Consortium & Chief Strategist, IoTG Strategy and Technology Office at Intel
    - Mark Dixon, Senior Architect for Smarter Cities at IBM
  • Toward Internet of Everything: Architectures, Standards, & Interoperability Jun 21 2017 3:00 pm UTC 60 mins
    Ram D. Sriram, Chief of the Software and Systems Division, IT Lab at National Institute of Standards and Technology
    In this talk, Ram will provide a unified framework for Internet of Things, Cyber-Physical Systems, and Smart Networked Systems and Societies, and then discuss the role of ontologies for interoperability.

    The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. These networks are currently being extended to have significant sensing capabilities, with the evolution of the Internet of Things (IoT). With additional control, we are entering the era of Cyber-physical Systems (CPS). In the near future, the networks will go beyond physically linked computers to include multimodal-information from biological, cognitive, semantic, and social networks.

    This paradigm shift will involve symbiotic networks of people (social networks), smart devices, and smartphones or mobile personal computing and communication devices that will form smart net-centric systems and societies (SNSS) or Internet of Everything. These devices – and the network -- will be constantly sensing, monitoring, interpreting, and controlling the environment.

    A key technical challenge for realizing SNSS/IoE is that the network consists of things (both devices & humans) which are heterogeneous, yet need to be interoperable. In other words, devices and people need to interoperate in a seamless manner. This requires the development of standard terminologies (or ontologies) which capture the meaning and relations of objects and events. Creating and testing such terminologies will aid in effective recognition and reaction in a network-centric situation awareness environment.

    Before joining the Software and Systems Division (his current position), Ram was the leader of the Design and Process group in the Manufacturing Systems Integration Division, Manufacturing Engineering Lab, where he conducted research on standards for interoperability of computer-aided design systems.
  • Why Vendor Liability is Necessary to Secure Consumer IoT Jun 21 2017 10:00 am UTC 60 mins
    Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc.
    We live in an IoT world. Connected devices now include TVs, refrigerators, security systems, phones, music players, smart assistants, DSL modems, cars, and even toothbrushes. Besides privacy and personal security concerns, these devices pose significant risk of cyber attacks. IoT devices have been used in devastating DDoS attacks that have paralyzed key Internet services, emergency services, and heating systems. In addition to run-of-the-mill hackers and hacktivists, they are the first line of attack in any low-to-medium scale cyber conflict between nation states.

    Vulnerable IoT devices represent a direct threat to safety, life, property, business continuity, and general stability of the society.

    This talk will discuss the security challenges surrounding IoT devices, and what is needed for a balanced framework that forces vendors to implement a reasonable level of best practice without causing them undue burden and risk.

    About the Presenter:
    Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.
  • The Future of Agile Network Architectures & IoT Connectivity Jun 15 2017 3:00 pm UTC 60 mins
    Ahmed Banafa, Ryan Allphin, and Brenda Boehm
    The Internet of Things is upon us. Vast amounts of big data are quickly approaching and network traffic, latency and bandwidth are at higher demands than ever. Storing, transmitting, and analyzing this data from IoT devices will require a secure and agile network architecture. Network failover and network security will be of the utmost importance.

    How will these changes in demand and technologies have an impact on new standards and protocols? Will network communications between devices and the cloud be safe? Tune into this dynamic panel discussion with leading IoT and network experts for the state of IoT networks.

    Panelists:
    Ahmed Banafa, SJSU Faculty Member and LinkedIn IoT Influencer
    Ryan Allphin, CTO, Cradlepoint
    Brenda Boehm, Chief Strategy Officer & Board Advisor, IoT Smart Solutions, TIA
  • Connected & Autonomous Vehicles: The Ecosystem Impacts of Automotive IoT Jun 14 2017 3:00 pm UTC 60 mins
    Haden Kirkpatrick, Esurance, Gaurav Bansal, Toyota ITC, Naren Ravi, American Honda Motor Company
    As cars become more data-centric and technology enabled, peripheral providers are increasingly trying to figure out what that means for their businesses. Other categories such as dealer services, insurance, sharing services, and even fast food providers are trying to determine what impacts, if any, a connected car will have.

    Join this webinar for a live panel discussion on:
    - The different technologies enabling connected vehicles
    - What role connectivity will play in autonomous vehicles, including safety
    - What will be the major catalysts for this major market shift?

    Moderated by: Haden Kirkpatrick, Head of Strategy & Innovation at Esurance
    Panelists: Gaurav Bansal, Senior Researcher, Cooperative Automated Driving, Toyota ITC & Naren Ravi, Technology Manager, Connected Vehicles, American Honda Motor Company, Inc.
  • Consumer IoT: Concerns and Opportunities Recorded: Apr 24 2017 2 mins
    Informa
    Connected devices are taking over our daily lives. Over 40 million U.S. adults use wearables at least once a month. Around 33% of homeowners in the U.S. use Smart Home products. So, what is holding back consumers from taking the final leap and adopting the Internet of Things?

    The biggest challenges for the IoT adoption is customer perception that IoT devices are too expensive or are unsure of the benefits they provide. Privacy and security of IoT devices is also a cause for concern.

    How can your business overcome these obstacles to consumer IoT adoption? Learn how to jump the gap from early adopter buy-in to mass market success. Join the Internet of Things World 2017:
    https://tmt.knect365.com/iot-world/

    * Use BRIGHT20 and save 20% off your IoT World 2017 registration.
  • Connectivity: The Key to IIoT Data Communications Recorded: Apr 5 2017 61 mins
    Dr. Rajive Joshi, Principal Solution Architect, Real-time Innovations Inc.
    Connectivity: The Key to IoT Data Communications
    Unlocking Interoperability via the Industrial Internet Connectivity Framework

    From a practical viewpoint, IIoT components and subsystems are built at different times, by different teams, and in different places. In order to interoperate, they need to be able to communicate meaningfully. In order to communicate, the underlying connectivity infrastructure must facilitate the exchange of information between the participants.

    The Industrial Internet Connectivity Framework (IICF) is a comprehensive resource for understanding Industrial Internet of Things (IIoT) connectivity considerations. Developed by international connectivity experts, the IICF defines the minimum expectations required to build next generation IIoT systems with syntactic interoperability between components and subsystems.
  • #Vault7 Happened. There’s No Going Back. Now What? Recorded: Mar 22 2017 60 mins
    Tony Busseri/Route1, Nick Bilogorskiy/Cyphort, Darin Andersen/CyberTECH, Jonathan Dambrot/Prevalent, James Carder/LogRhythm
    It's alleged that the CIA developed tools designed to spy on people, taking advantage of weaknesses in smart connected devices such as smart phones, smart TVs, smart personal assistants, and other household IoT technologies.

    In this discussion, we do a walk-through of what happened, what didn't happen, what systems and devices are impacted, and what data is involved in the leaks. Most importantly, we'll get some insight into what the larger societal impact of this could be.

    Join us for this in-depth conversation to learn:
    - Where stuff broke down.
    - Who is impacted, how are they impacted, and what’s at risk.
    - What the government can do to help.
    - What the commercial InfoSec community can do to help.
    - What consumers need to know to help (protect) themselves.

    FEATURED EXPERTS
    Darin Andersen, Chairman & Founder, CyberTECH
    Nick Bilogorskiy, Sr. Director of Threat Operations, Cyphort
    Tony Busseri, CEO, Route1 Inc.
    Jonathan Dambrot, CEO & Co-Founder, Prevalent
    James Carder, CISO & VP of LogRhythm Labs

    YOUR MODERATOR
    Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
  • WikiLeaks Vault 7: Facts, Fiction & Implications Recorded: Mar 22 2017 61 mins
    Vince Tocce (Vince in the Bay), Jake Kouns (Risk Based Security), Kenesa Ahmad (WISP)
    Wikileaks recently published a throve of documents, "Vault 7 Year Zero", which they claim expose a wide-ranging hacking tools used by the Central Intelligence Agency (CIA). If true, these cyber-weapons include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. In some cases, it might use smart TVs and other IoT devices in cyber surveillance and espionage.

    Join this panel discussion and find out more about the Vault 7 leak:
    - Truth / Fiction
    - How likely are you to get hacked
    - Security and privacy implications
    - Long-term effect across the tech industry and its relationship with government agencies

    Moderator:
    Vince Tocce a.k.a. Vince in the Bay

    Speakers:
    Jake Kouns, CISO of Risk Based Security
    Kenesa Ahmad, Chair of Women in Security and Privacy (WISP)
  • What WikiLeaks Vault 7 Means for You and Your Organization Recorded: Mar 17 2017 61 mins
    Chenxi Wang, Jason Haddix, and Gaurav Banga
    WikiLeaks published thousands of CIA-related documents in March detailing the agency's cyber-espionage programs. WikiLeaks is calling the archive "Vault 7". Discover the facts behind the leaks and how they may affect you. Some of the industry's top cybersecurity experts will discuss what the Vault 7 leaks mean for organizations and industries, from a security and privacy perspective.

    Speakers:
    Chenxi Wang, Founder, the Jane Bond Project
    Jason Haddix, Head of Security at Bugcrowd
    Gaurav Banga, Founder & CEO of a stealth mode cybersecurity startup
  • Why Critical Infrastructure Cybersecurity Is In a League of Its Own Recorded: Mar 15 2017 45 mins
    Paul Kurtz, CEO & Co-Founder, and Shimon Modi, Dir of Product & Technology at TruSTAR Technology
    It seems like it’s every other day the U.S. Government Accountability Office (GAO) is issuing a new critical infrastructure (CI) condemnation on a government agency or an intrepid security researcher is playing out what would happen to our electrical grid if a ransomware attack were to occur.

    But have we ever paused to consider exactly what it takes to protect critical infrastructure? In doing so, we can learn how to better protect ourselves.

    This session will highlight the similarities and differences of what it takes to protect critical infrastructure compared to the enterprise.

    Threat models are changing, which require a change in core capabilities necessary to protect CI. We’ll pull up some common tactics, techniques and procedures (TTPs) used in real world attacks using TruSTAR’s threat intelligence exchange platform to show how intelligence exchange can play a role in protecting CI in the future.

    This session will be led by Paul Kurtz, co-founder and CEO of TruSTAR Technology and former Senior Director for Critical Infrastructure Protection on the White House's Homeland Security Council (HSC), as well as Shimon Modi, Director of Product & Technology at TruSTAR and former Cybersecurity R&D Manager at Accenture Technology Labs, where he led the innovation strategy and build out of the Industrial IoT security capability.
  • The State of Cyber Defense in the Age of Hacks, Breaches and IoT Recorded: Mar 14 2017 64 mins
    Fred Wilmot (PacketSled), Usman Choudhary (ThreatTrack), Sushila Nair (NTT) Chris Roberts (Acalvio), Joseph Carson(Thycotic)
    Today, every organization is at risk of cyber attacks. It is no longer the question of if, but when. Attackers are motivated, sophisticated and not limited by national borders. With IoT devices increasing in adoption and becoming intrinsic elements in our smart city infrastructure, industrial control systems and transportation systems, improving cybersecurity is essential.

    Join this keynote panel and learn the latest trends in cyber attacks, hacks and breaches in an increasingly IoT world, and the recommendations on how to strengthen the security of our most critical assets.

    Moderator:
    - Fred Wilmot, CTO of PacketSled

    Panelists:
    - Usman Choudhary, Chief Product Officer at ThreatTrack
    - Chris Roberts, Chief Security Architect at Acalvio
    - Sushila Nair, Principal Consultant at NTT Security
    - Joseph Carson, Chief Security Scientist of Thycotic
  • Securing IoT: What Did We Learn From RSA 2017? Recorded: Mar 3 2017 58 mins
    Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor, Inc
    As the largest cybersecurity show on the earth, the RSA Conference always offers new products, insights and approaches to securing the latest connected devices. So with more Internet of Things (IoT) devices than ever before hitting the markets, what can be done to secure your corner of cyberspace. Let’s explore what we learned at the RSA Conference in San Francisco this year.

    About the Presenter:
    During his distinguished career, Dan Lohrmann has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Lohrmann joined Security Mentor, Inc. in August, 2014, and he currently serves as the Chief Security Officer (CSO) and Chief Strategist for this award-winning training company. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors.
  • Delivering Data Security with Hadoop and the IoT Recorded: Aug 9 2016 62 mins
    Robert D. Schneider, Partner at WiseClouds LLC, Reiner Kappenberger, HPE Security - Data Security
    The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side the surge of new devices has increased potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

    Data security is a fundamental enabler of the IoT, and if it is not prioritised the business opportunity will be undermined, so protecting company data is more urgent than ever before. The risks are huge and Hadoop comes with few safeguards, leaving it to organizations to add an enterprise security layer. Securing multiple points of vulnerability is a major challenge, although when armed with good information and a few best practices, enterprise security leaders can ensure attackers will glean nothing from their attempts to breach Hadoop.

    In this webinar we will discuss some steps to identify what needs protecting and apply the right techniques to protect it before you put Hadoop into production.
Connecting the world one device at a time
Find content relevant to the Internet of Things (IoT) on this channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Delivering Data Security with Hadoop and the IoT
  • Live at: Aug 9 2016 5:00 pm
  • Presented by: Robert D. Schneider, Partner at WiseClouds LLC, Reiner Kappenberger, HPE Security - Data Security
  • From:
Your email has been sent.
or close