The Crucial Role of Identity in Securing Industrial IoT
- LANGUAGE: English DATE: Tuesday, September 26, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in the world smart and connected, the Internet of Things has already passed the peak of inflated expectations, with both vendors and users of the technology finally starting to care more about such things as interoperability and security.
Although consumers have recently become somewhat disillusioned about “smart homes”, the industrial IoT segment is growing, fueled by the constant need of companies to increase their operational efficiency in the digital age. Unfortunately, many existing IoT devices were never designed with security in mind and lack any technical capacity to perform basic identity and access management or protection against cyberattacks, which makes them easy targets for hackers.
Identity management plays an important role in protecting both IoT devices and the systems with which they interact. Digital identity is the basis for authenticating and authorizing device management and data flows. For years, identity has played a crucial role in protecting users, applications, and services. Bringing the notion of identity to smart industrial devices is thus especially important for ensuring not just information security but physical safety and business continuity of manufacturing, power generation, transportation and many other critical processes.
In this webinar, you will learn about:
- technical challenges with IoT communication and identity
- current and forward-looking device identity models and international standards to address IoT identity
- using Identity to secure industrial devices and systems
- top trends and security best practices in Industrial IoT
In the first part of the webinar, John Tolbert, Lead Analyst at KuppingerCole, will present an overview of technical challenges with IoT communication and identity and will talk about the latest developments in device identity models and the standardization efforts to make them a reality.
In the second part, Ashley Stevenson, Identity Technology Director at ForgeRock, will elaborate on the crucial role of identity in securing industrial devices and systems and will provide a deeper insight into the top trends and security best practices for the Industrial IoT.
c/o Taylor Wessing - Am Sandtorkai 41 • 20457 Hamburg • Germany
The ForgeRock Identity Platform™ transforms the way millions of customers and citizens interact with businesses and governments online, providing better security, building relationships, and enabling new cloud, mobile, and IoT offerings from any device or connected thing. ForgeRock® serves hundreds of brands like Morningstar, Vodafone, GEICO, TomTom, and Pearson with customer identity, as well as governments like Norway, Canada, and Belgium, among many others. Headquartered in San Francisco, California, ForgeRock has offices in London, Bristol, Grenoble, Oslo, Düsseldorf, Paris, Sydney, Singapore, and Vancouver, Washington. For more information visit http://www.forgerock.com and follow us on Twitter @ForgeRock
Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.
In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.