Enabling Industry 4.0 and Digital Transformation by bridging IoT Security gaps

Logo
Presented by

Mark Brown, David Mudd, and Isabel Forkin, BSI

About this talk

With the acceleration of Industry 4.0, accompanied by the convergence of the Internet of Things (IoT) and Operational Technology (OT), systems can now be connected to corporate IT, the cloud and central management systems. The number of connected devices is predicted to rise to 75 billion by 2025, and with that expansion comes increased risk. As Organisations embrace digital transformation and evolve the new normal, they need to understand their accountability and responsibility for security in the ecosystem. This is particularly important in sectors like healthcare, where connect devices are used to monitor and treat patients and transmit sensitive data. This highlights the importance of the security and resilience of the devices, applications and the data they generate. The session will cover: * Explore the issue of IoT security across the asset lifecycle and the risks associated with exposed networks * Look at accountability from planning and manufacture, to installation and disposal * Explain how to ensure a robust system, manage business and technology cyber risks and achieve sustainable resilience in IoT
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (82)
Subscribers (5427)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.