View More
View Less
System Message
My Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Wait Listed
Personal Calendar
Conference Event
Times for this session to be announced soon.
Conflict Found
This session is already scheduled at another time. Would you like to...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Replies ()
New Post
Microblog Thread
Post Reply
Your session timed out.
This web page is not optimized for viewing on a mobile device. Visit this site in a desktop browser to access the full set of features.
LiveWorx 2018

s868 - Are Your IoT Devices, Applications and Data secure?

Session Description

The Internet of Things (IoT) presents a huge business opportunity across almost every industry. However, it is also creating a massive attack surface in the enterprise, introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. Until now, security has been treated as an afterthought; by adding layers of security after devices are delivered, with infrastructure and applications already in place. But security for the IoT is too important to be treated as an afterthought. IoT’s unique characteristics are also forcing a fundamental rethink about how Enterprises need to implement security management for devices and data. To combat these challenges, Device Authority has developed an enterprise IoT security blueprint which details device and data security guidelines for organizations of all sizes and industries. In IoT there is not one organization or one solution which can solve everything – it’s important to use expertise from within the wider ecosystem. Comodo CA provides trusted, mutual-authentication solutions, utilizing PKI certificates and high-availability, batch-issuance system for admins to easily enroll, download and decrypt quickly and efficiently. Gemalto provides Hardware Security Modules (HSMs) and Key Management System (KMS) for automated PKI certificate provisioning, high-assurance device authentication and managed end-to-end encryption at IoT scale. Organizations benefit from flexible options for secure and centralized key management, whether in physical, virtualized infrastructure, and public cloud environments. Data Protection on Demand gives customers options when migrating operations to the cloud and/or through a managed services model. Existing security solutions have evolved as an afterthought for the changing digital world. We now have an opportunity to include security earlier on at the design stage, in the new IoT world. Device identity and integrity are the new perimeters for IoT. Data security and privacy are extremely important to enterprise IoT use cases. Any enterprise-class IoT security solution requires a combination of automated PKI, high assurance PKI key storage and management, along with enterprise data security platform integration. In this session, learn about: • Device and Data Security • Implementing and running security operations at IoT scale • Meeting Compliance requirements and requests • Meeting performance requirements as per the use case

Session Presenter
Additional Information
Security & Privacy
Understand how to implement robust security throughout the lifecycle of an IoT device; gaining knowledge of the key requirements for IoT security.
Learn why it is important to include security at design stage.
Understand how to deliver device trust, data trust and operational efficiency to your customers.
Breakout Session
45 minutes
Session Schedule