Days


Tracks

Monday, January 22, 2018
1:00pm
Monday - 1/22/18
Fog Computing Workshop ()
Introduction to FOG
FOG-01
Is Fog just about bringing the cloud closer? How does edge management change by utilizing a Fog framework? Find out why Fog Computing may be an ideal environment for IoT.
Register me
IoT Certification ()
Managing IoT Partners and Competitors
IOTC-01
It is unusual for a customer to only have one brand for their cars, appliances, etc. When it comes to the Internet of things best of breed solutions often require support services from distributors to support their partners. This session focuses on how distributors work to bring complete solutions and support their ecosystem.
Register me
IoT Security Certification ()
IoT Security Basics
IOTSC-01
Business Development Manager, Technology Partner Program, Axis Communications
Lots of elements go into a discussion of security, including some personal concerns about privacy. When we talk about IoT devices that are distributed and designed to report critical information, redundancy is also a major concern. What represents the framework for IoT to be secure?
Register me
LoRA Workshop ()
Introduction to LoRAWAN
LORA-01
Co-Founder, Coris
What is the technology associated with LoRa and what are the benefits in deploying these systems? This session looks at the advantages of LoRa for specific deployments and how companies are embracing LoRa solutions.
Register me
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
2:00pm
Monday - 1/22/18
Fog Computing Workshop ()
Edge Management and the Fog Framework
FOG-02
IoT is all about distributed systems and as a result it represents the requirements for extending the Enterprise networking capabilities beyond the firewall. This session discusses how enterprises can use the Fog Framework to enhance security and optimize processing.
Register me
IoT Certification ()
Developing IoT Reseller and VAR Relationships
IOTC-02
The Internet has certainly accelerated everyones go to market strategy, but there are still customers, products and solutions that need to be managed by people and not just the web. This session looks at the pluses and minuses of go to market opportunities and how to segment opportunities to maximize revenue and minimize cost.
Register me
IoT Security Certification ()
IoT Blockchain Strategies
IOTSC-02
Co-Founder and CPO, Chronicled
Many people point to block chain as a method of improving IoT solutions, this sessions looks at the real advantages of block chain for IoT and what can be done to support complex solutions using IoT in supply chain and manufacturing.
Register me
LoRA Workshop ()
Narrowband (and CAT M1) versus LoRa
LORA-02
The initial push for LTE was designed for the consumers, which left a gap to be filled to support small devices sharing small amounts of information. Now LTE has increased its capabilities to support IoT requirements with NB and Cat M1 solutions. How does LoRa compare with these implementations?
Register me
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
3:00pm
Monday - 1/22/18
Fog Computing Workshop ()
Multi-dimensional Scalability using Fog Computing
FOG-03
This talk discusses five dimensions of scalability in large-scale IoT deployments, and how Fog Computing can help address the challenges. The first dimension is capacity, which is the IoT network’s ability to support huge numbers of devices, computational loads, data sets, numbers of users, and network bandwidth. Fog nodes can scale horizontally and vertically to help address these challenges. The second dimension is performance, where networks must exhibit low latency, high storage throughput, and very accurate algorithm results. Fog Computing allows computation and storage functions to be moved to the optimal place in the network, and dynamically grow or shrink in performance as needed. Third, there is scalable reliability, including the ability to address non-critical but cost sensitive IoT applications in the same network as lifeline and life critical apps, directly controlling high power or potentially hazardous systems. Fog nodes support both internal fault tolerance (using techniques like duplicated processors and RAID storage) and node-level redundancy. For the fourth dimension, Fog supports scalable security, where data and applications in the IoT system have varying requirements related to data security, privacy, and data breech resistance and hacker immunity. Fog has a very robust security infrastructure that can be selectively applied to different layers of data in different ways. Finally, there is application scalability, including the ability of Fog nodes to host different layers of different applications, isolate some applications from others, support multi-tenancy, and dynamically distribute application hosting horizontally and vertically across large networks of Fog nodes.
Register me
IoT Certification ()
Supporting the Developer Community
IOTC-03
Sr Product & Marketing Manager IoT - Connected Solutions, Verizon
Go from a simple IoT prototype, to a market-leading solution faster. During this session, Verizon ThingSpace will create a working prototype using ThingSpace, Verizon’s IoT Platform. The prototype will use Verizon Cat M1 network to transmit sensor data to ThingSpace IoT platform where it can be displayed and analyzed. From idea to prototype in minutes…. Rapid development using cutting edge platform and one of the most advanced networks.
Register me
IoT Security Certification ()
Device Security
IOTSC-03
The Internet of Things is bringing exciting new benefits to businesses and consumers across many different industries. It is also bringing a whole host of equally exciting, yet certainly challenging problems to solve - including security. If you are responsible for developing an IoT solution, you know it needs to be secure, but what does that mean and how do you go about achieving that security? In this session we will look at some of the key ingredients involved in securing your IoT solution from both the hardware and the software perspectives.
Register me
LoRA Workshop ()
LoRa Case Studies
LORA-03
Who is using LoRa today and what are the lessons they have learned in deploying these systems?
Register me
  Fog Computing Workshop
  IoT Certification
  IoT Security Certification
  LoRA Workshop
4:00pm
Monday - 1/22/18
  Special General Session
5:30pm
Monday - 1/22/18
()
Networking Reception & Battle Awards
X-01
  
Tuesday, January 23, 2018
8:30am
Tuesday - 1/23/18
()
Continental Breakfast - Proper Badge Required
X-02
  
9:00am
Tuesday - 1/23/18
Business Intelligence and Analytics ()
Making Sense of Data Streams
BIA-01
Director, Oracle
The critical challenge is using this data when it is still in motion – and extracting valuable information from it. How do companies tap into their IoT sensors to collect data, enable predictive and prescriptive analytics while still maintaining data integrity?
Register me
Industrial IoT Conference ()
IoT on the Factory Floor
IIOT-01
CMO, FreeWave Technologies Strategist , Accenture Internet of Things Evangelist, SAP
How is IOT being deployed on the factory floor and how does it improve the management of production? Have we gotten to the point where Programmable Line Cards are taking advantage of connectivity or are gateways making human intervention easier. Where is the promise of IoT for manufacturing being delivered and how?
Register me
IoT Security 4.0 Conference ()
Role Based Access Control
IOTS-01
Executive Entrepreneur, MACH 37 CEO, Mobelisk Security & Privacy Officer, Ayla Networks
It’s embarrassing how many times we end up reading about a sensor or a system has been breached and hackers use the back door to access consumer information. Part of the issue is that data is not mapped into models of access control. Hear about solutions that allow companies to secure the information and ensure that the data is not available to everyone.
Register me
IoT Enterprise Operations ()
Using Market Research to Guarantee Success
OPS-01
Director, Business Development, CalAmp
IoT transforms problems into opportunities. But how do you know if you have optimized the opportunity? The answer lies in gathering and analyzing primary research on the problems, identifying the possible outcomes and ideal solutions. This discussion is focused on how to perform the research, identify the risks and achieve the desired outcome and benefits.
Register me
The Smart City Event ()
Planning for Smart, Safe & Secure Cities
SC-01
Co Chair Industrial Internet of Things (IIoT) Energy/Utility/Oil & Gas, IIC Industrial Internet Consortium
The news is filled with discussions and proposals about smart city deployments, but what are the development strategies that make the implementation real and valuable to the municipalities? This session provides a framework for cities that are looking to make Smart City systems a permanent part of their infrastructure.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security 4.0 Conference
  IoT Enterprise Operations
  The Smart City Event
10:00am
Tuesday - 1/23/18
Business Intelligence and Analytics ()
The Analytics of Things
BIA-02
CTO - Head Of Technology and Innovation, Philips
It often gets lost that one of the core components of the IoT’s “things” is their attributes and the data dictionary that must be mapped into the Business Intelligence systems. Once the data mapping is done the next effort is to integrate the knowledge base into the processes. This panel is a discussion about how IoT analytics impact Enterprise IT systems.
Register me
Industrial IoT Conference ()
The Industrial Internet Security Concerns
IIOT-02
Executive Entrepreneur, MACH 37 President and CEO, Wibu-Systems USA CEO, Mobelisk
Identity theft happens despite attempts to protect personal information, and it can be a devastating event for the individual. Cyber-attacks occur similarly in an enterprise or its Industrial Control System (ICS) architecture, also delivering devastating impacts for the success of the business. This session will address the current state of these threats, outline what technical solutions, either available now or under development, can be identified to close the gaps regarding cyber security.
Register me
IoT Security 4.0 Conference ()
IoT Sensors: Hardened and Tested
IOTS-02
Vice President of Engineering, Globalscape
IoT device makers face a number of choices when it comes to securing their products. Often security decisions are limited to the needs and limitations of each product. That could, over time, lead to a fragmented set of technologies that need to be managed leading to higher costs. Secondly, security failures can occur at multiple points in a devices lifecycle. How does this impact device security? What are the core principles that all device OEMs must take into consideration to implement an IoT security Strategy and not just a point solution? Is there a framework that can be applied to make the right decision?
Register me
IoT Enterprise Operations ()
Planning Field Deployments
OPS-02
CSE, Cisco President, Aizoon
Your company has done its’ research and identified the benefits of IoT for your operations, but now comes the questions about implementation. It’s time to look at the location of your assets and determine the best strategy. Where does LoRA fit in? Should gateways act as aggregation points? This panel looks at how to determine and build upon the right strategy.
Register me
The Smart City Event ()
Smart Phones, Smart Citizens and the Social Good
SC-02
CEO/Co-Founder, V-2-X Founder & Co-Author, The Silent Intelligence CTO * EVP STRATEGY & INNOVATION * GM, EMEA , Digital Turbine
Social networks, like Facebook, Wayz and Yelp are defacto word of mouth engines that people use to guide and avoid issues. How can a city build solutions that take advantage of citizen connectivity to alert, alarm and appreciate the concerns and communications needed in a city? Is “there an App for that” or do we need to augment apps with other things?
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security 4.0 Conference
  IoT Enterprise Operations
  The Smart City Event
11:00am
Tuesday - 1/23/18
  Keynote Presentation
11:30am
Tuesday - 1/23/18
  Keynote Presentation
12:00pm
Tuesday - 1/23/18
()
Conference Luncheon - Proper Badges Required
X-03
  
1:00pm
Tuesday - 1/23/18
Business Intelligence and Analytics ()
Measuring Success with Real Results
BIA-03
Most of the sensor information you get is pretty binary. Things are working or they are not; yet somehow you are required to report how you have improved operations with real results. How do you go from Big Data to relevant data in a manner that proves the value of your IoT deployment?
Register me
Industrial IoT Conference ()
Trustworthy Endpoints
IIOT-03
Chief Technical Officer, AdaptiveMobile Director, Network Security, Technical Product Management, Oracle Director, Oracle
Trustworthiness is a paradigm put forth by NIST (National Institute of Standards and Technology) and IIC (Industrial Internet Consortium) to address the relationship of key system characteristics of IIoT (Industrial Internet of Things) component and systems. The IIC defines trustworthiness as the degree of confidence one has that a system performs as expected, characterized by the five key elements of safety, security, reliability, resilience and privacy in the face of environmental disruptions, human errors, system faults and attacks. Trustworthiness is a trait used for years to define the characteristics of both IT (Information Technology) and OT (Operation Technology) systems. In IT, trustworthiness mainly addresses security, reliability, and privacy. On the other hand, trustworthiness in OT mainly addresses safety, reliability and resilience. Addressing the missing key system characteristics in both IT and OT systems and focusing on the relationship of the five key characteristics of the IIoT, trustworthiness paradigm will solve many IT/OT convergence problems, especially conflicts between safety, security, and privacy.
Register me
IoT Security 4.0 Conference ()
Why DIY is DOA for IoT Security
IOTS-03
Securing IoT is unlike any other computing scenario we’ve secured in the past. Like icing on a cake, nearly all-previous security solutions have been ‘layered’ on top of the device. This approach to secure IoT simply is not possible. For IoT, security needs to be in the cake batter… before the cake is baked. The critical importance of IoT in today’s IT infrastructure has passed the threshold of tolerance for using open source or DIY solutions. Most organizations need complete, flexible, commercial solutions including management (GUI), reporting and analytics…and designed to be ‘in the cake batter’ and not layered on.
Register me
IoT Enterprise Operations ()
Bluetooth 5: One PAN to Rule Them All
OPS-03
Director of Technology, Cradlepoint
Bluetooth 5 is a new personal area network protocol released by the Bluetooth SIG to improve and grow the capabilities of an already existing and successful protocol. This lecture talks about the ins and outs of Bluetooth 5 from a use case, hardware, and protocol standpoint. Bluetooth 5 now provides more capabilities of any PAN communication and is set to overtake the IoT world as the de-facto standard for near range communication.
Register me
The Smart City Event ()
Clean Water and Other Utilities
SC-03
Special Assistant City Manager, City of Kansas City, Missouri GM/CFO, SPEC Sensors, LLC
Smart public infrastructure includes the ability to deliver essential services like clean water, dependable power, safe gas, and efficient public lighting. Smarter management of them is the foundation for smart cities. What sensor strategies and frameworks should be put in place for cities to support their citizens and avoid the missteps recently in the news?
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security 4.0 Conference
  IoT Enterprise Operations
  The Smart City Event
2:00pm
Tuesday - 1/23/18
Special Panel Discussion ()
Analyze This
GS-02
Partner, 151 Advisors CEO, Director of Content, Crossfire Media Vice President, Harbor Research Senior Analyst, ABI Research
  Special Panel Discussion
3:00pm
Tuesday - 1/23/18
Keynote Presentation ()
Keynote Presentation
K-03
VP Internet of Things Group, Intel
  Keynote Presentation
3:30pm
Tuesday - 1/23/18
Keynote Presentation ()
Keynote Presentation
K-04
Chief Consumer Security Evangelist, McAfee
  Keynote Presentation
4:00pm
Tuesday - 1/23/18
Special Panel Discussion ()
Money Matters
GS-03
Managing Director, MVP Capital President, Thiel Advisors, Inc. Managing Partner, Drake Star Partners Managing Director, Canaccord Genuity
  Special Panel Discussion
5:00-6:30pm
Tuesday - 1/23/18
()
Grand Opening Reception in Exhibit Hall
X-04
  
Wednesday, January 24, 2018
8:00am
Wednesday - 1/24/18
()
Continental Breakfast - Proper Badge Required
X-05
  
8:30am
Wednesday - 1/24/18
Special Panel Discussion ()
Women in IoT
GS-04
Vice President of Marketing, OpenFog Consortium Founder, Innovation Women
  Special Panel Discussion
9:30am
Wednesday - 1/24/18
Keynote Presentation ()
Keynote Presentation by Arm - Fogonomics: The Coming Era of Fog Computing in IoT
K-06
Director, IoT and Embedded, Arm
  Keynote Presentation
10:00am
Wednesday - 1/24/18
  Keynote Presentation
11:00am-4:00pm
Wednesday - 1/24/18
()
Visit the IoT Evolution Exhibit Hall
X-06
  
12:00pm
Wednesday - 1/24/18
()
Lunch Tickets Provided in Exhibit Hall - Proper Badge Required
X-07
  
1:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics ()
Analytics: Going Beyond Gathering to Finding Value
BIA-04
President and CEO, Decisiv
Before we called it IoT and M2M, we had various closed systems that enabled reporting and system evaluations. As IoT deployments become better networked, do the analytics measure new opportunities for IoT to be deployed? Hear about the analytics that will make IoT valuable.
Register me
Industrial IoT Conference ()
The Digital Transformation Opportunity in Industrial IoT
IIOT-04
Vice President, Harbor Research Head of business strategy for Cisco's education services , Cisco Founder , SmartCityWorks
The Industrial IoT represents a unique combination of opportunity and challenge for digital transformation. In these asset-intensive industries, preventing unscheduled downtime may be the Industrial IoT's killer app, yet incremental gains in throughput and efficiency are important priorities as well. Industrial environments also carry a legacy of often decades-old equipment that must be brought forward against a backdrop of enabling IT technologies that churn every 18 months. And while cybersecurity remains a critical concern, manufacturers and resource companies are finding that the potential benefits of technologies such as virtualization and remote connectivity outweigh the risks of not adopting them. In this presentation, Alex Glaser of Harbor Research reviews why the Industrial IoT--including the discrete manufacturing, oil & gas, refining, power gen, bulk chemicals and metals & mining sectors--are pursuing digital transformation, specific use cases of how they are implementing transformative new technologies, and the benefits they have achieved.
Register me
IoT Security 4.0 Conference ()
IoT - The S is for Security
IOTS-04
SVP, Strategy & Corporate Development, Cradlepoint
People make jokes about IoT security, but the reality is that connectivity can be taken advantage of regardless of whether you deploy IoT solutions or not. How do companies identify and isolate sensors and systems that have back doors and represent threats to the entire network? Hear how companies can implement an IoT Security strategy that manages legacy as well as new opportunities.
Register me
IoT Enterprise Operations ()
Building IoT Success
OPS-04
Co-Founder, Coris
Every Enterprise has the challenge of managing multiple buildings of some kind, (e.g. Factories, Garages, Office space, Retail Outlets, and / or Warehouses). For years, these challenges have been managed without a lot of data gathering. Thermostats were localized and the use of energy for heating, cooling and lighting were considered “sunk costs”. Find out how IoT has changed and improved upon this model of building Management.
Register me
The Smart City Event ()
Commuting Delays with Smart Traffic
SC-04
Founder & CEO, Kollabio, Inc.
Is their any mayor in the world that has not heard a complaint about commuting? The Answer is probably not. Using IoT to smooth out traffic patterns may not eliminate the calls, but it can certainly improve the systems and reduce the jams. This is a discussion about Smart Traffic Management, be it road, rail, street or subway.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security 4.0 Conference
  IoT Enterprise Operations
  The Smart City Event
2:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics ()
Big Data, Big Lakes, Bad Decisions
BIA-05
Internet of Things Evangelist, SAP
In the old days, we used to field various closed systems to enable reporting and local system management. Now, however, we are facing massive amounts of data being delivered in various formats. Streams and lakes of data are being gathered, but insight can still be elusive. This session will explore how IoT systems will increase business intelligence in the enterprise.
Register me
Industrial IoT Conference ()
Putting a Framework on Connectivity Requirements
IIOT-05
Director, IoT OS Platform, Silicon Labs CEO, Kisi
The Industrial Internet of Things (IIoT) landscape today is a confusing mix of proprietary connectivity technologies and standards. Some are general purpose, some are mostly appropriate for enterprise applications and others are optimized for a narrow set of domain-specific use cases in vertically integrated systems. This confusion hinders the ability to share data that IIoT systems need. Architects need clarity on how to effectively share data between IIoT components and systems. To address this confusion, the Industrial Internet Consortium (IIC) just released the Industrial Internet Connectivity Framework (IICF). It is the result of years of work by many organizations and is the only extensive connectivity analysis by multiple experts from many companies at a major consortium. More importantly, it not only provides high-level design guidance, but also detailed, useful, tangible and practical guidance for those building IIoT solutions today.
Register me
IoT Security 4.0 Conference ()
Asset Management & Surveillance
IOTS-05
Crimes of convenience can occur because things of value are neglected. IoT can be used to determine the position of systems and to monitor assets with GeoFencing and thereby reduce the opportunity for theft. This session talks about the practical aspects of using asset management to protect corporate inventory as well as business and institutional property.
Register me
IoT Enterprise Operations ()
Offshore Energy Harvesting
OPS-05
Vice President, BEC Technologies Executive Vice President & Head of Americas , Flutura Decision Sciences & Analytics
The Ocean has more than one way to harvest energy. Oil Rigs and Wind Turbines have similar requirements in terms of alerts, alarms and management, but need connectivity and control. Hear how IoT is being used to manage both of these resources.
Register me
The Smart City Event ()
Smart City Success Stories
SC-05
Chief Architect- IoT, Techolution Chief Marketing Officer, Unified Inbox Pte. Ltd.
We have had a lot of investment in trials from both the public and private sector in Smart City solutions. We have asked implementers of these solutions to participate and share their experience and frustrations with becoming a Smart City.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security 4.0 Conference
  IoT Enterprise Operations
  The Smart City Event
3:00pm
Wednesday - 1/24/18
Business Intelligence and Analytics ()
Fog Computing: Analytics and Processing at the Edge
BIA-06
Director of Technology, Cradlepoint
While the Cloud promises economies of scale and vast resources, many enterprises are recognizing the need for computing resources at the point where processing can have the most impact. Edge and Fog Computing are paradigms that seek to maximize performance by keeping the information where it’s most valued – at the edge.
Register me
Industrial IoT Conference ()
MuLTEfire Solutions: Does LTE Mean Linking Things Everywhere
IIOT-06
Channel Manager - IoT, Verizon Wireless
MulteFire is delivering a new way to wireless. MulteFire is an LTE-based small cell technology that operates standalone in unlicensed and shared spectrum – delivering LTE-like-performance with Wi-Fi-like deployment simplicity. By removing the requirement to own licensed spectrum to deploy LTE technology, MulteFire broadens the LTE ecosystem to industrial IoT, enterprises, venues and more. Attendees at this session will learn how MulteFire allows anyone to deploy and operate their own private or neutral host MulteFire network. They will gain an understanding of how an industrial IoT environment will benefit by deploying a MulteFire network.
Register me
IoT Security 4.0 Conference ()
Avoiding the IoT Zombie Apocalypse
IOTS-06
Senior Principal, Infineon and Trusted Computing Group
What are the business and technical implications of new attacks like the CIA’s CherryBlossom toolkit and Mirai? These toolkits go after IoT devices, routers, and gateways. They use sophisticated techniques to compromise these systems, turn them into zombies, and enslave them into botnet armies that are rented out for DDoS attacks. Thus, even mighty giants like Twitter and Netflix have laid low. Hear about the new practices that use hardware security to protect the next generation of IoT devices and routers against such attacks. How can IoT avoid being part of the problem?
Register me
IoT Enterprise Operations ()
Agricultural IoT: Managing Earth, Wind and Water
OPS-06
Co-Founder and President, SensorInsight, LLC Partner, Jivoo
On the farm the weather drives decisions. If there is a drought you try to store, if there is rain you try to divert. Whether drones are watching above or sensors are buried in the soil, they are being used to manage resources, optimize crop production and track equipment. This session explores the numerous ways farming is being optimized by IoT.
Register me
The Smart City Event ()
The Whole City is Watching?
SC-06
Business Development Manager, Technology Partner Program, Axis Communications Chief Technology Officer, Clear2there
Surveillance systems have been deployed in every major city, yet we now have less than 10% of the video is watched by a human. How do we move surveillance to the next level where systems can make us safer and deter crime?
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security 4.0 Conference
  IoT Enterprise Operations
  The Smart City Event
4:15pm
Wednesday - 1/24/18
  Keynote Presentation
4:45pm
Wednesday - 1/24/18
Keynote Presentation ()
Keynote Presentation
K-09
Vice President, , Watson IoT Platform, IBM
  Keynote Presentation
8:00pm
Wednesday - 1/24/18
()
IoT Conference Party
X-08
  
Thursday, January 25, 2018
8:30pm
Thursday - 1/25/18
()
Continental Breakfast - Proper Badge Required
X-09
  
9:00am
Thursday - 1/25/18
Business Intelligence and Analytics ()
Horizontal vs. Vertical Analytics
BIA-07
All Enterprises have to report information in a common manner when it comes to finances. However when it comes to IoT operations and IT often are at odds about whether platforms can be common or specific to the functions of the company. This panel is a debate about what works and why when developing your IoT Business Intelligence and Analytics strategy.
Register me
Industrial IoT Conference ()
IIoT and AI: Thinking Linking Things
IIOT-07
Chief Product Officer, Crate.io Product Manager, IBM
The speed of the Internet goes beyond human ability to process, so machine learning and artificial intelligence is essential in order for IoT to deliver on the promise of “just in time management”. How is AI being designed and developed to take advantage of IoT. What markets will be the early adopters and what lessons do we hope to gain from it.
Register me
IoT Security 4.0 Conference ()
The Birds of a Feather Security Q&A
IOTS-07
Senior Principal, Infineon and Trusted Computing Group
Until recently most security experts have had open and frank conversations in public about threats. These days’ companies have a tendency to hide their pain. We are hosting this open forum for everyone to improve their cyber security plans. No question is stupid, so ask away. We have gathered some of our best thought leaders into the room to answer any questions attendees have about their unique situations.
Register me
IoT Enterprise Operations ()
Finding the Answers at the Edge
OPS-07
Principal Engineer, Cisco Founder, NetFoundry
The cloud is constantly be touted as the platform for IoT, but the reality is that solutions for operations are local, isolated and do not require IT’s central control. This discussion is about how solutions at the edge like Fog, Mobile Edge and other perimeter management frameworks enable Enterprises to improve processes in the field.
Register me
The Smart City Event ()
FirstNet: Getting Answers to Manage Crisis
SC-07
The Next Generation of emergency services is not a 911 call but the ability for people to report crisis and for dispatchers to see the entire situation. Where do we stand on getting the network deployed and how is it changing the ways cities react to situations of turmoil.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security 4.0 Conference
  IoT Enterprise Operations
  The Smart City Event
10:00am
Thursday - 1/25/18
Industrial IoT Conference ()
Blockchain in the Supply Chain
IIOT-08
Co-Founder and CPO, Chronicled
IoT Security 4.0 Conference ()
IoT Security Strategies
IOTS-08
President, BostonBase Inc. Director, ProjectSafty.org
IoT Enterprise Operations ()
How Smart Lighting Headaches are Delaying IoT
OPS-08
Vice President of Global Marketing, Fulham Co., Inc.
The lighting industry is just starting to look more closely at standardization, and with IoT in place, communication for IoT controls will be a matter of implementing well-defined, compatible control standards.
Register me
The Smart City Event ()
GoogleMaps & Fleet Tracking
SC-08
Many of us take advantage of GoogleMaps on our mobile phone as consumers, but like many Internet solutions accessing the data at a deeper level brings bigger benefits. This session is a discussion about the information available via GoogleMaps that can enable better fleet management. From estimates of fuel consumption to other Wayz of tracking delivery we get to look at how apps and IoT meet.
Register me
  Business Intelligence and Analytics
  Industrial IoT Conference
  IoT Security 4.0 Conference
  IoT Enterprise Operations
  The Smart City Event
11:00am-2:00pm
Thursday - 1/25/18
()
IoT Evolution Exhibit Hall Open
X-10
  
11:15am
Thursday - 1/25/18
Keynote Presentation ()
Keynote Presentation in Expo Hall Theatre
K-07
  Keynote Presentation
11:45am
Thursday - 1/25/18
Special Panel Discussion ()
Conference Wrap-Up in Expo Hall Theatre
GS-06
  Special Panel Discussion

 

DIAMOND SPONSOR

GOLD SPONSORS

CORPORATE SPONSORS

ANALYST PARTNERS

MEDIA SPONSORS