Internet of Things

  •  TYPE: Track    START DATE:  Thursday, May 15, 2014     START TIME: 14:30    LOCATION:  ALPSEE
Conference Agenda

Moderator(s):

When 50 billion devices start sending data over networks, security challenges become exponentially harder. Machine to machine (M2M) solutions require the ability to handle existing security governance investments yet support a variety of security protocols, encryption and privacy that cross mobility, sensor networks, diverse devices, M2M telecommunications and data centers. The nature and scale of the M2M infrastructure causes some unique challenges such as trust (untrusted devices, networks), cost (cannot be expensive considering the large number of devices), shared data (who owns it and how to securely share it), access (static access controls cannot adjust to the dynamic nature of M2M), performance (low power devices can´t spare many cycles for security), heterogeneity, integration into existing security paradigms etc. that have to be addressed.

This block of session will provide insight and advice on the security aspects of this emerging technology.


Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block of sessions you will be able to:

  • Explain use cases, application categories and business models for the Internet of Everything.
  • Describe the challenges from the Identities of Things.
  • Describe the challenges unique to the application of M2M and IoT devices within various industry sectors.
  • Describe the unexpected and complex implications of the Internet of Everything.
  • Explain how identity, confidentiality, denial of service, privacy and other aspects are different in the IoT space.

This block qualifies for up to 3 Group Learning based CPEs depending on the number of sessions you attend.

Sessions:

Connecting the Real World with the Virtual World: Use Cases, Application Categories and Business Models for the IoE

Date: Thursday, May 15, 2014 Time: 14:30-15:30

Connecting the Real World with the Virtual World: Use Cases, Application Categories and Business Models for the IoE
Hans Zandbelt, OpenID Foundation • Rob Newby, KuppingerCole

The IoE can be roughly categorized in 2 application areas: Information, Awareness & Analysis on the one side and Automation, Control & Optimization on the other hand. In this session, we will talk about applications and business models within those 2 areas, how they will evolve and how they will impact your infrastructure.

Challenges from the Identities of Things
Ingo Friese, Deutsche Telekom AG

The Internet of Things (IoT) is beginning to evolve and early solutions are now being implemented. We can find implementations in areas like logistics, farming, home automation and many others. But its restrictions become obvious as we try to connect solutions of different vendors, communities or standard groups. Apart from communication protocols new identity management mechanisms are crucial for a growing Internet of Things. This presentation discusses real project examples and introduces...

Security in a World of 50 Billion Connected Devices

Date: Thursday, May 15, 2014 Time: 15:30-16:30

Security in a World of 50 Billion Connected Devices
Gershon Janssen, OASIS Board of Directors • Prof. Dr. Dawn Jutla, Peer Ledger • Michelle Chibba, Office of the Information and Privacy Commissioner Ontario • Alex Kritikos, Software AG • Peter Niblett, IBM

When 50 billion devices start sending data over networks, privacy and security challenges become exponentially harder. M2M solutions require the ability to handle existing security governance investments yet support a variety of security protocols, encryption and privacy requirements that cross mobility, sensor networks, diverse devices, M2M telecommunications and data centers and their relevant policy domains. The nature and scale of the M2M infrastructure create unique challenges such as...

Unexpected and Complex Implications of the Internet of Everything (IoE)

Date: Thursday, May 15, 2014 Time: 17:00-18:00

Unexpected and Complex Implications of the Internet of Everything (IoE)
Jeff Stollman, RMTM • Dr. Karsten Kinast, KuppingerCole

With the recent acquisition of NEST Labs, Google is paving it´s way into your bed- and sitting room, listening to your most private prefences and habits. Home automation and many other areas, where the Internet of Everything will try to add value to our analog lives, come along with strong privacy concerns and is raising new questions:    Who owns the data on your automobile´s computer? The manufacturer? The current title holder? The auto, itself?...

Security and Identity Challenges for the Internet of Everything
Rob Newby, KuppingerCole • Paul Fremantle, WSO2 • Geoff Webb, NetIQ • John Barco, ForgeRock • Per Hägerö, neXus • Jason Hart, SafeNet

The Internet of Things (IoT) concerns the connection of physical devices (cars, thermostats, smartphones, home lighting, tide sensors, smart meters, etc) to the Internet. There are more devices connected to the Internet than people on the planet, and the prediction is that there will be 50 billion IoT devices by 2020. The IoT brings with it many security challenges, and this session will explore these challenges as well as looking at some emerging solutions. Of course these challenges...

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2014

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 13 - 16, 2014 Munich, Germany

Partners

The European Identity & Cloud Conference 2014 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00