Securing Industry 4.0
Facebook Twitter LinkedIn

Securing Industry 4.0

Combined Session
Friday, May 13, 2022 10:30—11:30
Location: B07-08

Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security! IAM-related experiences from the automobile and home appliances sector.

A lot of innovation around physical products is created by connectivity, allowing them to become part of the consumer's larger digital ecosystem and the providing enterprise. Gartner says in its megatrends for the next decade: "Anything costing more than a few USD will be "intelligent" and networked." Examples are electronic wall boxes to charge cars or remote control for dishwashers, cars, etc.
Several compelling use cases require smart things to act not only for themselves but also on behalf of the end-user. OpenID Connect and OAuth 2.0 can be used to provide a user-friendly and secure user journey. But how trustworthy is a connected device at the edge? Learn about the experiences with these standards when it is about IoT and how Identity&Access Management solutions help reduce time-to-market, costs, and inconsistency between different touchpoints.
Key learnings:
- What are the design paradigms to build IAM for IoT?
- How does IoT fit into a Zero Trust Architecture?
- What are the essential protocols to bring identity and IoT together?
- How to build an IoT showcase by leveraging low-code platforms?
- What are the challenges, best practices, and pitfalls of a IAM for IoT projects?

Andre Priebe
Andre Priebe
iC Consult Group GmbH
Andre Priebe is Chief Technology Officer of the iC Consult Group, a vendor-independent system integrator specialized in Identity & Access Management with more than 500 employees around the...

Cyber-Securing the Digital Industry

Living in a hyperconnected world where we can change color of the product we ordered until a moment before it dives into the color bath requires manufacturers to open their Operational Technology (OT) to the internet and expose it more than ever to cyber attacks. If machines, production lines or heating and cooling systems become targets, the potential damage can be existential. 

As the way we look at cybersecurity within our IT world is very different to the requirements within the OT world, an integrated IT/OT Security Strategy has to combine traditional and sometimes legacy approaches with future oriented, often AI-driven solutions to secure humans, things, processes and supply chains throughout the whole techhnology stack.

In this session, we will create a blueprint of topics you will need to take care about to secure your hyperconnected enterprise.

Graham Williamson
Graham Williamson
Graham Williamson is a senior Analyst at KuppingerCole. Graham has practical experience in the identity management and access control industry having completed assignments in the academic,...


On-Demand Access
Re-live EIC 2022
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address