October 4, 2017 – Day 1 Sessions
7:30 am – Registration Opens & Breakfast
Transitioning to LPWAN: Navigating the Non-Cellular Sea
There is currently a lot of talk surrounding non-cellular connectivity for IoT, and it can be difficult to see how to integrate these new services with your existing devices. The applications that can benefit from these technologies are almost endless, from smart roads to agriculture and renewable energy, but as LPWAN expands globally, cellular technology will help to supplement its growth. For these sectors and countless more, freedom to use both cellular and LPWAN technologies together is crucial to minimize downtime, and allows devices to be future-proofed despite major market changes. This presentation will elucidate the different options available to the IoT market today, and show that a flexible approach to connectivity is the most sensible approach in these interim stages of LPWAN.
Sam Colley, CEO – Pod Group
LPWAN Ecosystem – It Takes a Village to Raise an Industrial IoT Application
Everyone’s talking about IoT, and companies are now adding IoT into their business model. However, most businesses do not have the expertise to quickly evaluate and execute on all the different components of the IoT solution stack. For companies looking to implement IoT solutions, the search of where to start, who to work with, and where to find answers can be overwhelming. It Takes a Village to Raise an Industrial IoT Application will focus on the layers of the IoT stack, explore some of the options that are available in each layer and discuss pros and cons. It Takes a Village to Raise an Industrial IoT Application will also provide some common-sense IoT implementation tips based on lessons learned working with Fortune 100 companies to startups implementing IoT solutions, so businesses can learn from the experiences of others as they move from trial to full roll out.
Ramzi Alharayeri, Director of Business Development - Sigfox
10:15 am – Networking Break in Exhibit Hall
11:00 am – Session 1
IoT and LPWA: Two Acronyms that Need Each Other and Why
Syed Zaeem Hosain, author of second edition of “The Definitive Guide: The Internet of Things for Business,” will share his point of view on the rise of a low bandwidth connectivity solution known as Low Power Wide Area (LPWA) networks that are optimized for the Internet of Things (IoT). In his speech, the founder of Aeris will explain what problem LPWA networks are solving and how they are built specifically for M2M and IoT communications to offer long-range, low-power consumption. He will share how LPWA networks solve cost and battery-life issues that cellular technology cannot and how LPWA networks solve range issues that technologies like Bluetooth or Bluetooth Low Energy (BLE) struggle with; and cite examples of how the need for LPWAN is much greater in industrial IoT (IIoT), civic and commercial applications. In these environments, the huge numbers of connected devices can only be supported if communications are efficient and power costs are low. Finally, Hosain will communicate a “call for action” that prompts the audience to embrace why IoT and LPWA together need each other and will help them on their journey of turning their unconnected products into connected services.
Syed Zaeem Hosain, Founder and Chief Technology Officer – Aeris
Chillin’ Like a Villain: Applying Critical Thinking to Security
Oh no, bad guys can drive everyone’s car into a ditch, take out the entire electrical grid with a USB stick and an engineered cascading failure model, and your refrigerator can be turned into a zombie (yes, an actual brain eating zombie, not just a spambot)!! Sounds a lot like evening news teasers (“The one superfood you only need to eat a teaspoon-full in order to live forever! Next, on BS News Ten!”). True security ninjas see through the FUD with brains so sharp they can cut through a granite block. Using critical thinking skills, you can focus on the real threats instead of wasting your time chasing the next shiny object.
In this session you’ll learn how to spot FUD from researchers and the press, and what attackers really want and what motivates them. This session will help you turn your intellect into a weapon of mass protection and help you apply actionable countermeasures to real threats.
Millan Patel, Program Director for Security Offerings Management – IBM
11:40 am – Session 1
Low Power Networking – Understanding the IoT’s Superpower
Analysts are unanimous: Low-power networking technologies are accelerating the growth and adoption of IoT. With all the options, how do you determine what’s right for your project? From wide-area domain in both unlicensed and licensed spectrum standards to wireless local area domain and the ground-breaking power-saving benefits of Wi-Fi. This session takes the audience through an examination of a detailed analysis, mapping the top ranking low power networking standards and the critical specifications that really the design. Understand what to look for when reviewing power specifications and the impacting dimensions such power vs. range, power vs mobility, power vs latency. Walk away learning how to best approach a cost-effective strategy that takes total cost of ownership and supply into consideration by leveraging new module design approaches that mitigate the effect of complexity caused by the proliferation of options.
Richard Najarian, Vice President, Solutions Marketing - Telit
Can your IoT Connectivity Protocol Defeat Cyber Attacks?
IoT systems across all industries share the common connection requirements of reliability, scalability, and security. How are your software components connected? Does that middleware meet your reliability, scalability, and security requirements?
This presentation takes an in-depth look at IoT applications using the Data Distribution Service (DDS) standardized connectivity protocol from the Object Management Group (OMG), with a focus on secure data communications. DDS is a proven, mature protocol, with over 10 years of implementation history across military, industrial, medical, power, automotive, and IoT industries. The DDS Security specification includes state-of-the art technologies for end-to-end secure data communications.
Nina Tucker, Co-Founder & Vice President of Client Services – Twin Oaks Computing
12:20 pm – Networking Luncheon
1:30 pm – Session 1
IoT for Mobile and Security-Enhanced Applications
This session topic will cover IoT and its relationship to custom mobile applications. Another angle covered will be explaining why IoT devices need setup, monitoring, and management in order for them to be successful. The main focus will be on how IoT fits into building custom mobile applications in the ever-expanding application market and how to enhance their security and reliability.
Many devices can now connect to the internet. The device applications are never ending. Having a seasoned team of developers and IoT experts is the core of building these products. It also depends on what field the device is being used in. A BACtrack breathalyzer being used for parolees will have more robust security system than Bluetooth speakers for a backyard barbecue. You rely on the expertise of the software developers and project managers as well as the client to build the most user-friendly and reliable software. Once you have figured out the functionality and security of a device, you may safely implement it into an application.
Kaj Gronholm, CEO -Woodridge Software
2:10 pm – Session 1
Building IoT Solutions with MRAA and UPM Libraries
IoT solution designers will learn how to integrate multiple technologies into “An automatic watering system” combining the libraries for sensor interaction, cloud platform API’s, and a wide range of Intel tools. The application handles several features such as turning a water pump on and off based on a configurable schedule, detecting if the watering system is pumping as expected using a water flow sensor, keeping track of watering system using cloud data storage, and sending text messages to alert the user if the system is not working as expected. This solution also allows to set watering intervals using phone via a built-in web interface.
Sisinty Patra, Internet of Things (IoT) Software Engineer in the Software and Services Group – Intel Corp.
IoT Security: Connecting “Smart” Business with Smart Cyber Protection
This presentation will examine early stage weaknesses and challenges related to IoT compliance and discuss the advantages of cyber security in the face of a growing regulatory push. We will explore leveraging FedRAMP and other cloud services as a means of meeting compliance requirements and transferring risks to the larger cloud services. Using new architecture and business paradigms of pushing IT out to benefit from IoT introduces new governance rules for global, ecosystem-level approach to information, data, and business decisions. The compliance and cyber challenges are nuanced and may impact manufacturers differently than services companies especially as it relates to floor shops and trusted insiders. The speaker will focus on sharing risk-based due diligence practices and use cases related to specific IoT compliance issues already faced by those in manufacturing and state and federal arenas. Where applicable, the speaker will extend the discussion to tactical steps for meeting FTC, CUI and DFARS compliance including privacy as it relates to advancing IoT systems.
Maria C. Horton, CISSP, ISSMP, IAM, Founder and Chief Executive Officer – EmeSec Inc.
3:00 pm – Networking Break in Exhibit Hall
3:30 pm -
IoT Security: Understanding the Threats & Best Practices for Defending Against Them
As a provider of an IoT framework product that runs on edge devices for connecting, controlling, and monitoring devices over computer networks, one thing that we have learned at Tridium is that while many organizations are taking approaches that revolve around specific technologies and the security controls of their digital assets themselves (e.g.: gateways, devices, and data), this alone is an incomplete approach. It is important to know that a successful cyber security program encompasses far more than simply an asset-focused approach or an approach that only revolves around technology. A more holistic, defense-in-depth security approach is needed – an approach that not only involves processes and technology, but revolves around people.
This presentation will briefly cover cyber security threats that face organizations utilizing IoT systems (gateway controllers, edge devices), and then it will focus on security best practices. Some of the best practices covered will be organizational, some will focus on configuration and network security, and it will also cover best practices for enforcing security best practices through technology from a product development and configuration perspective.
Kevin T. Smith, Chief Architect – Tridium
4:10 pm – Session 1
Intelligent Edge Automation
900 MHz Frequency-Hopping Spread Spectrum (FHSS) radios have the ability to host Process Automation Apps for intelligent command and control of remote sensors and devices. Without having to leverage municipal Wi-Fi bandwidth, lay fiber or employ cost-prohibitive cellular, cities can now take advantage of proven low-power FHSS technology to automate processes at the network edge. The proliferation of smart sensors and high-bandwidth devices makes low-power FHSS technology a viable and cybersecure wireless data option. No longer restricted to pure telemetry or I/O, FHSS increasingly supports voice and video, and can scale to form self-healing mesh networks. Because FHSS is wireless technology that spreads its signal over rapidly hopping radio frequencies, it is highly resistant to interference and is difficult to intercept. This makes it inherently cybersecure.
Moreover, transmits data over much longer distances than Wi-Fi, Bluetooth, Lora or Zigbee (up to 60 miles in some cases). By employing intelligent FHSS technology, municipalities can take advantage of real-world Fog Computing and Intelligent Edge Communication Devices. These devices can be deployed as Process Automation nodes, making decisions and taking action at the Access Level (or at the sensor or device). Indeed, not only is FHSS a reliable and robust option for IoT networks, it is also a low CAPEX and OPEX solution that can be ruggedized to work for years without maintenance.
Eddie Garcia, Technical Marketing Manager – FreeWave Technologies
IoT Security Threats – What They Are and How to Protect Against Them
This session will review the newest security threats unique to the IoT, the opportunities for IoT device manufacturers to create security standards (and why they should), and go over suggestions for guarding against those threats within an enterprise.
In today’s IoT, it can be challenging to manage and patch IoT devices – they can be hacked in minutes. Malware can even introduce a permanent backdoor to many devices, allowing hackers to add them to a botnet whenever they wish. Worse, the functionality of many IoT devices adds the potential for “creepy” attacks that take advantage of gathered data, special functionality, and even surveillance. Both users and developers need a clearer understanding of the threats involved with the IoT. Despite its promise, it also carries huge user and enterprise risk — and the industry’s need for regulation is a timely one as production often eclipses best practices.
Jeff Finn, CEO – zvelo
5:00 pm – Cocktail Reception in Exhibit Hall
October 5, 2017 – Day 2 Sessions
7:30 am – Registration and Breakfast
8:00 am – Keynote Session
Low Power Networking Panel Discussion
Low power wireless networks are a lynch pin for an IoT system. They are the critical element connecting the remote device in a home, office, factory, or outdoor facility getting remote devices connected to the cloud. With the many wireless standards to choose from, are there applications or environments that certain ones have advantages. What drives the decision of which one to use, what’s the consequence of choosing the wrong one, how to handle security, what’s next – join us as we discuss which low power wireless technologies are best for IoT.
Jim Kokal, President – Wavetrix
Ken Ogami, Innovation Engineer - Bluetooth SIG, Inc.
Joe Andrulis, Industry Consultant – Highland Partners
9:00 am – Session 1
To Be or Not to Be – Open Source Conundrum for the IoT Enterprise
There’s a strong drive by Enterprises to adopt a one-stop solution for their Internet of Things Projects. This had led to great interest in IoT Platform Vendors as well as DIY IoT Platforms. The variety of entities such as Hardware Device Manufacturers, Software vendors, Cloud providers pose a diverse set of challenges with respect to Solution-Building, Security, Scalability, Budgets. The open source movement is in some ways the spiritual core of the Internet, encompassing much of the hardware, software, and protocols that make up the global communications infrastructure — as well as championing openness, transparency, and the power of collaborative development. This session will share the pros and cons including best practices with using a Open Source frameworks and Technologies to building an End-to-End IoT Solution based on existing implementations with respect to the following topics: security with devices and the cloud, IoT network security, software updates, the benefits of API economy and management, applicability of automation frameworks.
Prasanna Sivaramakrishnan, Senior Solutions Architect – Red Hat, Inc.
New Wireless, Battery Free Sensor Technology Enables Wider Use of Sense Data in IoT Implementations
Traditional electronic sensors are composed of three primary functions: A power source to power the electronics in the sensor, a sensing element to convert a physical parameter into digital data, and a processing block for data formatting, analysis, and communication between the sensor and the IoT network. As the demand for additional sensing nodes increases, the cost to scale using traditional electronic sensors limits the deployment of sensors in some applications.
A new type of wireless sensor is available that untethers the sensing function from the power and processing functions. These wireless, battery free electronic sensors collect data using new energy harvesting technology and a shared power and processing component. This type of sensor architecture is a complement to existing electronic sensors, and reduces the cost to scale to large numbers of sensors in certain applications. A shared sensor “hub” is used to aggregate data from multiple wireless data, and provide connectivity to the cloud for continuous monitoring, analytics, and action.
Greg Rice, Technical Manager, Protection and Signal Division – ON Semiconductor
9:45 am – Networking Break
10:10 am – Session 1
Introduction to OCF/IoTivity
IoTivity, a Linux Foundation Collaborative Project that aims to implement the specification from the Open Connectivity Foundation (OCF), already supports a variety of operating systems, like Linux (regular variants as well as Tizen and Android) and Arduino, aiming to increase that number later. This presentation will focus on the base framework of IoTivity and will focus on how it has implemented its functionality on those operating systems. It will do that by showing examples of code. At the end, the presenter will show how different systems can connect and talk to each other via the OCF protocol as implemented by IoTivity.
Sashi Penta, Senior Software Engineer and technical lead, Internet of Things – Intel Corp.
Security Risks for IoT in an BYOD Culture
IoT devices and BYOD policies have become the norm in enterprise environments, but the security risks associated with integrating these devices into the corporate network are becoming increasingly clear.
One of the problems with those devices that they have a free pass into the network, no one seemed to be concerned with the security issues involved with such devices. Those devices are hard or impossible to patch. They are open and available to the Internet and come with default passwords. While convenient for end users, it’s a nightmare for corporate security. In this session, Portnox CEO Ofer Amitai will explain the different risks associated with each IoT and BYOD device, depending on its architecture, demonstrate how to hack a security camera and lastly how to detect and segment these devices in the network. He will also provide a thorough approach to device management, detailing the following steps: decision to protect, assessment, prevention, onboarding, detection and response.
Ofer Amitai, CEO & Co-Founder – Portnox
10:50 am – Session 1
Leveraging Low Power WAN in Traditional Applications
SCADA platform providers have long been in the business of anticipating the requirements of system integrators as data acquisition networks have evolved. During the last 15 years, there has been a wide adoption of IP networks as the infrastructure supporting these networks has become ubiquitous. New architectures based on low power wide area networks are the next technology evolution to impact SCADA providers. While new non-SCADA business models are emerging, there is clearly a desire to integrate these networks and the sensors that they support into traditional real-time SCADA applications. The decision facing system integrators in the current environment is whether to build the infrastructure for LPWAN or use an infrastructure provider and pay as you go.
Edward Nugent, COO – PcVue, Inc.
11:30 am – Session 1
The OHIO Principle
Passive RFID technology is a fundamental requirement of the IoT as many items, things, have no inherent technology to communicate their status or to receive data pertaining to their condition.
We will consider the challenges, and identify the device and it’s competencies and shortcomings that still need to be addressed, that can overcome the need to identify some 78% of ‘things’ in the Internet Universe, the socio economic maelstrom. The OHIO Principle provides an overarching methodology to not only allow the use of passive UHF technology but to measure the impact and frame the component use in a holistic semblance of the embedded identifier of all things, where all items, all things, all bodies are identified, assessed, even instructed based on conditional data and the metrics surrounding that data.
Dr. John Greaves, RF Solutions Architect – Lowry Solutions
Industrial IoT Ecosystem
With the advent of IOT in Manufacturing sector – there is a huge trend seen where manufacturers are implementing IoT in production models and operational processes. It is often seen that manufacturing plants are digitally gloomy. There is inadequate data extracted which can give incomplete insights on key metrics which can pose production risks. Since the maintenance department is already flooded with emergency maintenance, the ability to realize the importance of predictive maintenance is negligible, consequently the plant management is blind to potential risks and how to react to strange situations.
The topic will stress on need for transforming the plant floor digitally, innovative approaches being adopted by Industries to improve production, return on assets and lower cost.
Ajay Agarwal, Sr. Vice President - Happiest Minds Technologies
12:10 pm – Networking Luncheon
1:00 pm – Session 1
Home Mesh: The Next Step in Home Networking
As Smart Homes become a reality around the world, the focus is shifting towards home mesh to increase connectivity and meet the demands of our data-hungry lives. As we move toward the next step in home networking, we are witnessing a shift in the questions being asked; how can we increase connectivity efficiently? How can we connect smart devices and systems that are of benefit to everyone? How do we ensure consumers and businesses alike benefit?
There are many questions being asked, but, perhaps there are a lack of questions around the existing infrastructure to support these smart initiatives. Welcome G.hn. The backbone to our future infrastructure needs, capable of extending Wi-Fi coverage and performance throughout homes, businesses, and MDU’s, which can support the ultimate in-home broadband experience. G.hn creates a true hybrid network over any available medium – something that is increasingly important as the industry shifts towards next generation home networking, and the rise of home mesh networking. G.hn extends connectivity than further before, in fact further than any other technology on the market.
Dr. Len Dauphinee, President – HomeGrid Forum
1:40 pm – Session 1
LPWAN’s Chicken & Egg Problem
All published market research reports on LPWAN estimate business opportunities in the multibillion IoT device range in the next few years. Based on these expectations many LPWAN networks have been quickly deployed in many countries around the globe. However, the penetration of LoRa on the end-node side is to happening as fast as the LoRa Alliance would like. The same could be said of other LPWAN technologies like NB_IoT, where the demand of devices is even higher than the silicon availability. This reason for this high demand is the uncountable number of business opportunities these low cost connectivity technologies is enabling. But there is a chicken and egg problem with many of these new potential business opportunities, mainly because they are new and therefore it is unknown if they will have success or how/when a ROI is expected. For this reason, the demand for LPWAN devices is actually a demand for a Proof Of Concept devices in small amounts (few 100s to few 1,000s). This presentation analyses and compares the main LPWAN solutions from a technology and market opportunity point of view, before introducing the features and capabilities for developers of LPWAN-Flexino platform.
Dr. Juan Nogueira, Director of the Center of Excellence for Wireless and Connectivity – Flex
2:30 pm – Conference Conclusion