...
European Identity & Cloud Conference 2015
05.05. – 08.05.2015, Munich, Germany

Moderator:

With more devices now connected to the internet than people, the Internet of Things is the next big thing. However, since much of what is being developed is based on technologies with known weaknesses, it can easily become the next big disaster.

The vision for the IoT is of a world where nearly everything and everybody is connected through the internet and this connectivity enhances the quality of life for individuals, and improves the efficiency of organizations and services. A related concept of Operational Technology foresees that industrial production in the future will be characterized by highly flexible mass production exploiting integration between the manufacturing machines themselves as well as the customers and suppliers.

All of this comes with privacy and security risks, which must be understood and managed by organizations adopting these new technologies.  However, the realization of the vision is also based on existing systems and infrastructures, which have known vulnerabilities. This amplifies a wide range of serious risks to security and individual privacy, which must also be addressed.

After attending this track, you will be able to:

  • Describe the Internet of Things and Operational Technology
  • Explain the benefits and risks arising from these
  • Describe the approaches needed to successfully manage these risks
  • Describe how organizations have successfully and securely implemented these technologies

 

After attending this block of sessions you will be able to

  • Describe the Internet of Things and Operational Technology
  • Explain the benefits and risks arising from these
  • Describe the approaches needed to successfully manage these risks
  • Describe how organizations have successfully and securely implemented these technologies

This block qualifies for up to 3 Group Learning based CPEs depending on the number of sessions you attended.


IoT/OT Privacy & Security

07.05.2015 14:30-15:30

Security and the Internet of Everything and Everyone

The vision for an Internet of Everything and Everyone (IoEE) is for more than just an Internet of Things. It provides opportunities for organizations to get closer to their customers and to provide products and services that are more closely aligned to their needs. It provides the potential to enhance the quality of life for individuals, through better access to information and more control over their environment. It makes possible more efficient use of infrastructure by more precise control based on detailed and up to data information. It will change the way goods are manufactured by integrating manufacturing machinery, customers and partners allowing greater product customization as well as optimizing costs, processes and logistics.

However the IoEE comes with risks, and organizations adopting this technology need to be aware of and manage these risks. The realization of the vision is based on existing systems and infrastructure which contain known weaknesses. This is leading to risks to individual privacy and the organizations using the technologies risk using tainted data.

After attending this session you will be able to:

  • Describe the 4 major challenges from the IoT
  • Describe the 5 major steps and organization needs to take to securely exploit the IoEE

IoT Privacy Risks, Legislation and Solutions

In this session the panel will look at how the IoT is changing the privacy landscape.  People are using devices without being aware of the amount of data that these devices are collecting or the potential uses to which this data will be put.  At the same time the legislation around privacy is being strengthened and how will this impact on the processing of this data.  How will the OASIS Privacy Management Reference Model and Methodology (PMRM) help to implement the policies controls and functionalities to mitigate these risks.

Identity of Things

07.05.2015 15:30-16:30

Putting Identity at the Center of IoT- Kantara IDoT Strategic Review

The whole world is talking about the business opportunities that the Internet of Things (IoT) will enable. Industry analysts predict that IoT product and service suppliers will generate growing revenue exceeding $300 billion in 2020. While others forecasts that the worldwide market for IoT solutions will grow to $7.1 trillion in 2020. With numbers in the billions and trillions it’s no surprise that the enterprise is paying more and more attention. This landscape of promise also brings mountains of strategic questions for the Identity and Security experts to ponder.

There are many standards that can be applied in the IoT space. However broad cross vertical interoperability remains as a challenge in the IoT. This session will review the current landscape for Identity considerations in the IoT space. It will discuss existing standards as well as the gaps to address to work toward broad market interoperability. The discussion will provide real world examples of challenges and opportunities for Identity in both the industrial and personal real of pervasive IoT. We invite you to join this interactive discussion of experts.

Your takeaways from this session:

  • What are current challenges and opportunities for identity in the IoT?
  • What are the existing standards and existing gaps industry needs to address?
  • Is my organization ready for the digital identity IoT transformation?
  • What do I need to know today to take action?

Process Control, Production IT and Operational Technology – No Go Areas for IDM?

IDM usually covers classical office IT. IDM controls who is allowed to do things, who is responsible, who is inside and who stays outside. In areas of operational technologies (OT) and process control we find similar questions. This presentation will take a closer look at typical usecases and practical patterns in OT-Areas.

  • Motivation and starting point: Why should IDM cope with OT? When is the right time to get involved?
  • Decoupling, robustness and decentralization: Some considerations on aspects beyond office IT working hours.
  • Some organizational aspects: What are the main differences?
  • Some thoughts on future prospects and widely divergent aims: Office IT, Cloud, IoT, OT.

Integration

07.05.2015 17:00-18:00

Mastering IoT Privacy and Security Risks Without Losing the Benefits of IoT

Organizations, both commercial and non-commercial, are eager to explore the new opportunities afforded by the Internet of Things. Applications range from the apparently trivial, such as Internet-connected toothbrushes, all the way through to critical infrastructure such as power grids. The designers and operators of such solutions may not be aware of the risks that they are exposing themselves to, and lack the tools and processes to protect them properly.

In this panel we will discuss:

  • the steps that an organization should take to identify risks, protect their assets and safeguard data, and then to detect, respond to and recover from attacks, and how cloud implementations can mitigate some of the risk inherent in operating an IoT solution. We will also also try to review the role that standards have to play and look at some of the security challenges that still remain.
  • Concrete IoT devices/research initiatives under development that illustrate the innovation and benefits expected with IoT technologies, and the challenges being addressed.
  • The challenges that follow from trying to securely integrate these devices together with each other and together with existing IT systems.
  • Concrete IoT devices/research initiatives under development that illustrate the innovation and benefits expected with IoT technologies, and the challenges being addressed.
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.