Things
Facebook Twitter LinkedIn

Things

Combined Session
Thursday, May 11, 2023 11:00—12:00
Location: A 03-04

Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking

Autonomous networking aims at the appropriate handling of the growing number of devices, machine, sensors and components for which authentication and authorization must be ensured, i.e., identities must exist. The initial provision of such identities, but also the handover and onboarding into the respective operational environment (WiFi, smart home, factory floor) require scalable, automated, end-to-end secured procedures and concepts to facilitate trusted communication, but also e.g., the provision of made-to-measure updates.
Making IoT/OT/IIoT identities and networks secure by design is essential. ACP (Autonomic Control Planes) and BRSKI (Bootstrapping Remote Secure Key Infrastructure) lay one foundation for achieving this.

Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Event Recording
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Presentation deck
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Matthias Reinwarth
Matthias Reinwarth
KuppingerCole
Matthias is Head of Advisory and oversees and leads the KuppingerCole advisory team. Additionally he acts as lead advisor in various customer projects. As head of the IAM practice, Matthias...

Running Machine Learning Analytics On Traces

Let’s do things differently. To start with, let us view logs and traces as no different from any other data. The data an application indirectly generates when in use (the logs and traces) is no different from the data an application directly works with (input and output). So let’s keep them all together in a scalable cloud storage repository. Once it is there, it is just like any other big data. We need to analyze and apply intelligent monitoring to detect situations of interest. So we need to apply trained ML models to a stream of such data for immediate alerting when the traces indicate an unwanted behavior occurring or brewing. This talk will show how to harness existing technologies to do just that.

Running Machine Learning Analytics On Traces
Event Recording
Running Machine Learning Analytics On Traces
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Running Machine Learning Analytics On Traces
Presentation deck
Running Machine Learning Analytics On Traces
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Fawaz Ghali
Fawaz Ghali
Hazelcast
Fawaz Ghali is a Principal Developer Advocate at Hazelcast with 20+ years of experience in software development, machine learning and real-time intelligent applications. He holds a PhD in Computer...

Spicing up Authorization - A Zanzibar inspired approach

As a global OEM of highly critical and complex industrial devices, managing access to hundreds of millions of IIoT device resources spread across customer sites all around the globe is already a challenging task.  
Use cases for providing a digital service platform need to address end customers accessing devices owned by themselves as well as priviledged access for in house and third party analytics applications and serice personnel. A combination of requirements for excelent user experience, authorization management and high performance for cross-tenant queries for endless scenarios can become a nightmare.  
The task was to analyze the access requirements, abstract them and then deploy a “Zanzibar” inspired approach to manage access authorizations with a swift and reliable backend architecture, able to handle millions of information assets to be protected against unauthorized access.  
Creating a mere access model does not do the full trick - it has to be cleverly designed into data storage structures and queries to achive the required performance goals!  
The talk quickly introduces the problem set and then dives deeper into how to implement data storage optimization magic to get quick response times and swift adjustments of authorizations.

Spicing up Authorization - A Zanzibar inspired approach
Event Recording
Spicing up Authorization - A Zanzibar inspired approach
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Spicing up Authorization - A Zanzibar inspired approach
Presentation deck
Spicing up Authorization - A Zanzibar inspired approach
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Roland Baum
Roland Baum
umbrella.associates GmbH
Roland Baum is Founder of German Start-Up umbrella.associates and architect of several enterprise ID and IGA environments. As a tech savvy wizard of OpenSource tools and data analysis, he combines...
Ilya Gubarev
Ilya Gubarev
Siemens AG
Ilya Gubarev is Chief Digital Software Architect of Siemens Large Drives Applications *. Additionally he is heading Architecture and Release Train department as part of software organization...

Tickets

On-Demand Access
Re-live EIC 2023
€500
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address