What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.
On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
RecordedFeb 22 201761 mins
Your place is confirmed, we'll send you email reminders
Although connectivity in the Industrial Internet of Things (IIoT) promises to transform the manufacturing and production industry, nearly eight in ten organizations have experienced an IoT cyberattack in the past year. Mark Hearn, Director of IoT Security at Irdeto, explores Irdeto's recent Manufacturing Cybersecurity Survey results in conversation with Stephen Mellor, CTO of the Industrial Internet Consortium. This webinar will also highlight strategies to combat cyberattacks, including the importance of a multi-layered approach to cybersecurity.
Kai Hackbarth, Evangelist at Bosch Software Innovations GmbH, discusses Over-the-Air updates and the role that Bosch and the Industrial Internet Consortium play in the industry in his presentation, "OTA Infrastructure for Semi-Autonomous to Autonomous Systems".
Ron Zahavi, Microsoft Azure IoT, & Sandy Carielli, Entrust Datacard
The cybersecurity landscape is complex and ever-changing. Therefore, deciding where to focus your security resources can be a challenge. Security maturity modeling provides a path for communicating with business stakeholders and a strategic step to attaining the necessary support to move forward with a comprehensive security roadmap.
The Industrial Internet Security Maturity Model (SSM)
•Provides actionable guidance for specific IoT scenarios
•Enables IoT providers to invest appropriately in security mechanisms to meet their requirements
•Helps providers make intelligent choices about which mechanisms to use and how they fit together
What is your Security Maturity Level?
In this Webinar you will hear an overview of the Industrial Internet Consortium’s Security Maturity Model and a process for applying that model to:
•Address your requirements and threat environment
•Evaluate risks consistently
•Identify the actions you need to take including
•Learn from case studies and specific practical implementation examples
•Make intelligent choices about which mechanisms to use and how they fit together
Co-presented by Kai Aldinger & Samir Damag, Solution Managers, IBU Mill Products & Mining, SAP
The mining industry is experiencing dramatic changes as it enters the Digital Age. The industry realizes it needs to mine smarter, not harder. During this webinar, Mining Solutions Managers from SAP will take a look at innovations driving the industry, and how intelligent mining enterprises are applying technology to:
• Make mining more predictable and safer
• Collaborate among customers, suppliers, and workers
• Enhance agility through real time decision support and integration of information technology with operational technology (IT/OT)
• Improve productivity through automation
Conal Deedy, Dr. Rajive Joshi, Christopher Miotke, Dr. Katy Salamati
Global Event Series - Cary, NC, USA
Moderator: Dr. Richard Soley, Executive Director, Industrial Internet Consortium
-Conal Deedy, Director of Connected Vehicle Services, Volvo Trucks NA
-Dr. Rajive Joshi, Principal Solutions Architect, RTI
-Christopher Miotke, Global Director, Automotive Autonomous Transportation, NetApp
-Dr. Katy Salamati, Transportation SME, SAS
Dr, Chellury (Ram) Sastry of Tata Consultancy Services presents a case study on Energy Management Solution for Commercial Buildings and Industrial Facilities at the Global Event Series in Cary, NC, USA.
Tom Snyder, Ty Roberts, Christopher Beall, Jim Haskins, Jennifer Robinson
Global Event Series - Cary, NC, USA
Moderator: Tom Snyder, Executive Director, RIoT
-Ty Roberts, Vice President, Product Marketing, Networked Solutions, Itron
-Christopher Beall, Account Executive, Building Clarity
-Jim Haskins, Smart & Connected Communities Business Development Manager, Cisco
-Jennifer Robinson, Director of Local Government Solutions, SAS
Digital Transformation through IoT that focuses on digital exploration, agile mining operations, connected assets, and next gen safety brings significant benefits to mining companies and mining technology suppliers alike. Mining organizations that don’t embark on IoT-enabled Digital Transformation will find it more challenging to compete in uncertain resources cycle. With more than 80% of IoT projects not progressing beyond POC stages according to Gartner, there is a disconnect between IoT technology and IoT capabilities.
This stems from a technology-centric approach to IoT that focus on connected “things” and less on the expected business outcomes. A July 2017 McKinsey study found that 70% of their respondents identified “integrating IoT solutions into existing business workflows” as a capability gap. The IoT challenge that mining companies now face is less of a technology problem and more of a business process problem.
This webinar presents a framework that provides the business architecture for using IoT that connects IoT technology to operational capability and business outcomes. The I2OC framework focus on aligning IoT technology with benefits such as increased asset availability, reduced downtime, reduced costs, increased efficiencies, and improve safety and governance. Pieter uses a practical mining example to present the I2OC framework.
Steve Hanna, Senior Principal, Infineon & Dean Weber, CTO, Mocana
The beginning of a security strategy starts at the end – securing your IoT endpoints. Endpoints are everywhere in the Industrial Internet of Things (IIoT) landscape. Without proper endpoint security, IIoT systems may put your organization or the greater public at increased risk. Plus, the viability of the IIoT depends on proper implementation of an endpoint security strategy to counter the growing and ever-changing threats.
During this webinar, the editors of the Endpoint Security Best Practices Whitepaper will discuss this important document, customer use-cases, and the core components of a comprehensive, IIoT solution.
Jeffrey S. Katz Head of Grid Technology Energy, Environment and Utilities industry, IBM
Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.
This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
Explore the role of the IoT in the mining industry. From big industry to incubators and startups -- many organizations are engaging globally via innovative ecosystems, testbeds and tech hubs for education, awareness, and best practices.
Dr. Manjari Asawa, Wipro; Brett Murphy, Real-Time Innovations; Brett Burger, National Instruments
The emergence of next generation distributed energy resources (solar, wind, battery) and storage technologies have challenged the capabilities of traditional, central-station power grid systems -- until now! Advances in embedded systems, analytics, machine learning and time-sensitive networking allow tightened integration, thereby digitizing the grid and addressing technical challenges previously impossible to solve.
This webinar will discuss new approaches to address operational challenges by integrating communications and control technology directly to the grid. Explore the IIC Testbed Program and learn how the award-winning Microgrid and TSN testbeds provide a rigorous testing environment for solving integration challenges in a multi-vendor, real-word environment based on industry standards (DDS, OpenFMB,TSN) and other emerging industrial IoT capabilities.
Marcellus Buchheit, President and CEO, WIBU-SYSTEMS USA
Your interconnected devices are only as strong as the weakest link. Choosing a connectivity solution without a robust security framework will leave your data and the system that supports it exposed and vulnerable. Fortunately, there are tools in place that can help address these challenges.
This webinar discusses the security-related benefits of applying reference milestones that the IIC has published over the last two years in industrial systems: the Industrial Internet Reference Architecture, the Industrial Internet Security Framework, and the Industrial Internet Connectivity Framework.
The Industrial Internet Consortium is a global, member-supported, organization that promotes the accelerated growth of the Industrial Internet of Things by coordinating ecosystem initiatives to securely connect, control and integrate assets and systems of assets with people, processes and data using common architectures, interoperability and open standards to deliver transformational business and societal outcomes across industries and public infrastructure.
IIoT Endpoint Security – The Model in PracticeMarcellus Buchheit, Co-founder, Wibu-Systems AG; Terrence Barr. Head of Solutions Engineering, Electric Imp Inc.[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]60 mins