Introduction to the IoT Security Summit: Edge to Enterprise
The opening session for the virtual IoT Security Summit hosted by Device Authority with special guests throughout the 3 days. We’ll provide an introduction to the theme of the event and provide an overview of what can be expected. We’ll be joined by special guest, Kevin Bocek, VP Security Strategy & Threat Intelligence at Venafi.
Featuring Darron Antill, CEO, Device Authority
An analyst insight into the current IoT IAM market
Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.
This interactive session will focus on:
- Key capabilities of IoT IAM platforms to meet the requirements of IoT security
- Understand why IoT IAM is substantially different from Traditional IAM
- Current state of the market / vendors
- Market drivers and expected growth (importance of IoT IAM)
Featuring Divya Baranawal, Research Director, Quadrant Knowledge Solutions
What is the IoT edge and why is security important?
The edge of the IoT is where the action is. It includes a wide array of sensors, actuators, and devices—those system end-points that interact with and communicate real-time data from smart products and services. From a security standpoint, data at the edge can be troublesome, especially when it’s being handled by different devices that might not be as secure as centralized or cloud-based systems. As the number of IoT devices grows, it’s imperative that IT understands the potential security issues and makes sure those systems can be secured.
Featuring James Penney, CTO, Device Authority and Steve Busby, Principal Program Manager for IoT, Microsoft
Kubernetes at the Edge of Manufacturing
Bringing more and more intelligence close to the manufacturing floor brings new levels of agility and product innovation. Kubernetes is the operating system for today’s cloud-native generation, and the right fit to bring powerful compute, analytics, and automation right to the factory floor. Extending capabilities once only reserved for the cloud next to assembly line means that identity is critical. Good news: Building in machine identity for your devices at the Edge closest to your production is simpler, faster, easier than ever before with Kubernetes. Learn how Kubernetes and CNCF Sandbox project cert-manager are bringing machine identity that’s shockingly simple and ready to scale.
Featuring Matt Bates, CTO and Co-founder Jetstack, and James Penney, CTO, Device Authority
IoT and Cyber Insurance: why is it important and what are the challenges?
The explosion of IoT devices is dramatically changing the cyber risk landscape — and not necessarily for the better. Many security experts believe that smart devices are creating a wave of vulnerabilities because they often lack strong — or, in some cases, even basic — security features. IoT devices often also lack regular product support, such as updates and patches, making them particularly vulnerable to newly discovered weaknesses.
Featuring Rob Black, CISSP, Founder and Managing Principal, Fractional CISO
A snapshot into the unique challenges of Smart Cities and how to secure them
Smart cities are no longer a concept or futuristic dream. Thanks to Internet of Things (IoT) solutions, many are already active and expanding rapidly. Municipal governments are leveraging cellular and Low Power Wide Area (LPWAN) wireless technologies to connect and improve infrastructure, efficiency, convenience, and quality of life for residents and visitors alike. But what are the key challenges of Smart Cities? That’s what we’ll look at during this session, and we’ll touch upon a critical factor – security.
Featuring Khalil Yazdi, CSO, XIG and Tyler Gannon, VP Strategic Alliances, Device Authority
Driving IoT security standards with FIDO Device Onboarding (FDO)
Today, the onboarding process for IoT devices is usually done manually by a technician – a process that is slow, expensive, and insecure. Industry sources have said that it is not uncommon for the cost of installation and setup to exceed the cost of the device itself. Although multiple companies have worked to automate the onboarding process, there wasn’t a widely accepted industry standard. Also, many proprietary solutions that do exist require that the end customer be known at the time of the device manufacture so that the device can be pre-configured. This creates friction and cost in the supply chain.
The FIDO Alliance stepped up in the summer of 2019 to address this industry challenge. With its broad membership of leading cloud service providers, semiconductor companies and security companies, the Alliance is well positioned to bring together those that create and supply the technologies in the IoT ecosystem. The FIDO Alliance formed its IoT Technical Working Group (IoT TWG) with these stakeholders to define a new standard for automated, secure IoT onboarding. Less than 2 years after the working group formed, the FIDO Alliance released to the industry the FIDO Device Onboarding (FDO) specification.
Join this session to understand:
- What FDO is
- Why it has been developed
- Who are the ecosystem vendors and key implementers
- How Device Authority has implemented FDO in our KeyScaler platform
Featuring Richard Kerslake, Intel and Device Authority