Conference Program

Transform your Business Model with IoT
There are up-front costs to the IoT, but the benefits hold promise for transforming your business model over the next few years. This session will talk about how connected products can deliver ROI across three categories. There include how data reduces costs, how subscription based IoT improves company revenue, and how engaging consumers develops brand affinity.

Pairing users’ data with ongoing communication is a powerful way to find out what consumers really want from your products and keep them engaged with your brand. The data you gather from your IoT products ultimately benefits everyone in your value chain, and it continues to provide rewards through your product life cycles.

Mike Merit, Vice President of Customer Success – Ayla Networks

To Be or Not to Be – Open Source Conundrum for the IoT Enterprise
There’s a strong drive by Enterprises to adopt a one-stop solution for their Internet of Things Projects. This had led to great interest in IoT Platform Vendors as well as DIY IoT Platforms. The variety of entities such as Hardware Device Manufacturers, Software vendors, Cloud providers pose a diverse set of challenges with respect to Solution-Building, Security, Scalability, Budgets. The open source movement is in some ways the spiritual core of the Internet, encompassing much of the hardware, software, and protocols that make up the global communications infrastructure — as well as championing openness, transparency, and the power of collaborative development.

This session will share the pros and cons including best practices with using a Open Source frameworks and Technologies to building an End-to-End IoT Solution based on existing implementations with respect to the following topics: security with devices and the cloud, IoT network security, software updates, the benefits of API economy and management, applicability of automation frameworks.

Prasanna Sivaramakrishnan, Senior Solutions Architect, Red Hat, Inc.

Leveraging Low Power WAN in Traditional Applications
SCADA platform providers have long been in the business of anticipating the requirements of system integrators as data acquisition networks have evolved.  During the last 15 years, there has been a wide adoption of IP networks as the infrastructure supporting these networks has become ubiquitous.  New architectures based on low power wide area networks are the next technology evolution to impact SCADA providers.  While new non-SCADA business models are emerging, there is clearly a desire to integrate these networks and the sensors that they support into traditional real-time SCADA applications.  The decision facing system integrators in the current environment is whether to build the infrastructure for LPWAN or use an infrastructure provider and pay as you go.

Edward Nugent, COO – PcVue, Inc.

Intelligent Edge Automation
900 MHz Frequency-Hopping Spread Spectrum (FHSS) radios  have the ability to host Process Automation Apps for intelligent command and control of remote sensors and devices. Without having to leverage municipal Wi-Fi bandwidth, lay fiber or employ cost-prohibitive cellular, cities can now take advantage of proven low-power FHSS technology to automate processes at the network edge.

The proliferation of smart sensors and high-bandwidth devices makes low-power FHSS technology a viable and cybersecure wireless data option.  No longer restricted to pure telemetry or I/O, FHSS increasingly supports voice and video, and can scale to form self-healing mesh networks.  Because FHSS is wireless technology that spreads its signal over rapidly hopping radio frequencies, it is highly resistant to interference and is difficult to intercept. This makes it inherently cybersecure. Moreover, transmits data over much longer distances than Wi-Fi, Bluetooth, Lora or Zigbee (up to 60 miles in some cases).

By employing intelligent FHSS technology, municipalities can take advantage of real-world Fog Computing and Intelligent Edge Communication Devices. These devices can be deployed as Process Automation nodes, making decisions and taking action at the Access Level (or at the sensor or device).  Indeed, not only is FHSS a reliable and robust option for IoT networks, it is also a low CAPEX and OPEX solution that can be ruggedized to work for years without maintenance.

Eddie Garcia, Technical Marketing Manager – FreeWave Technologies

Chillin’ Like a Villain: Applying Critical Thinking to Security
Oh no, bad guys can drive everyone’s car into a ditch, take out the entire electrical grid with a USB stick and an engineered cascading failure model, and your refrigerator can be turned into a zombie (yes, an actual brain eating zombie, not just a spambot)!! Sounds a lot like evening news teasers (“The one superfood you only need to eat a teaspoon-full in order to live forever! Next, on BS News Ten!”). True security ninjas see through the FUD with brains so sharp they can cut through a granite block. Using critical thinking skills, you can focus on the real threats instead of wasting your time chasing the next shiny object.

In this session you’ll learn how to spot FUD from researchers and the press, and what attackers really want and what motivates them. This session will help you turn your intellect into a weapon of mass protection and help you apply actionable countermeasures to real threats.

Millan Patel, Program Director for Security Offerings Management – IBM

Can your IoT Connectivity Protocol Defeat Cyber Attacks?
IoT systems across all industries share the common connection requirements of reliability, scalability, and security.  How are your software components connected?  Does that middleware meet your reliability, scalability, and security requirements?

This presentation takes an in-depth look at IoT applications using the Data Distribution Service (DDS) standardized connectivity protocol from the Object Management Group (OMG), with a focus on secure data communications.  DDS is a proven, mature protocol, with over 10 years of implementation history across military, industrial, medical, power, automotive, and IoT industries.  The DDS Security specification includes state-of-the art technologies for end-to-end secure data communications. 

Nina Tucker, Co-Founder & Vice President of Client Services – Twin Oaks Computing

IoT Threats – What They Are and How to Protect Against Them
This session will review the newest security threats unique to the IoT, the opportunities for IoT device manufacturers to create security standards (and why they should), and go over suggestions for guarding against those threats within an enterprise.

In today’s IoT, it can be challenging to manage and patch IoT devices – they can be hacked in minutes. Malware can even introduce a permanent backdoor to many devices, allowing hackers to add them to a botnet whenever they wish. Worse, the functionality of many IoT devices adds the potential for “creepy” attacks that take advantage of gathered data, special functionality, and even surveillance.

Both users and developers need a clearer understanding of the threats involved with the IoT. Despite its promise, it also carries huge user and enterprise risk — and the industry’s need for regulation is a timely one as production often eclipses best practices.

Dr. Ignacio Giraldez, AI Chief Scientist – zvelo

IoT and the Implications for Security Inside and Outside the Enterprise
In the enterprise today, connected IoT devices are everywhere – both inside and outside corporate environments. The need to identify, manage, control and secure a quickly growing web of connections and outside devices is making the already challenging task of security even more important, and onerous. Rich Boyer, CISO at NTT Innovation Institute (NTT i3), will discuss new ways of thinking and the approaches needed to address the emerging challenges of security in the enterprise. With a focus on the challenges and specific technical solutions possible using distributed trust, mutability, autonomy, and disposability, he will show how a single cohesive security management infrastructure can be created for the enterprise while still allowing the distributed value of IoT to exist anywhere.

Rich Boyer, Chief Information Security Officer and Chief Architect for Security – NTT Innovation Institute