You're visiting a past event.
Please click here to visit the current IoT Evolution site

AUGUST 17 – 20, 2015 • Caesars Palace | Las Vegas, Nevada

IoT Security Summit

August 17, 2015

When it comes to Security the terminology further gets stratified by layers.  From physical to political the need to manage the who, what and when of security becomes a complex discussion of each component. 

POS is worried about credit cards and virtual attacks, while much of Connected Building is concerned about physical malice and terror.  Thinking about security from the concept our IoT DNA (i.e., Devices, Networks and Applications), we can start to segment our security strategies.  

Our IOT Cyber Security is about finding the solutions that work on all the things we manage on the Internet.  At the end of this summit we intend to have a document of common understanding best guidance as to how to proceed with IoT Cyber Security strategies.


12:00pm
Protecting and Defending the Edge
Find out how to handle critical issues in developing, managing and securing the edge devices in an IoT Network.

rmac

axis

Clay Melugin
Clay Melugin
Senior Partner
RMAC Technology Partners

Vince Ricco
Vince Ricco
Business Development Manager, Technology Partner Program
Axis Communications

1:00pm
The Core of Securing Networks
Learn to deploy networks, manage IDs and protect your network from hackers.

pubnub

James Brehm & Associates

Todd Greene
Todd Greene
Founder & CEO
PubNub

Martha Vasquez
Martha Vasquez
Senior Analyst - Security & Managed Services
James Brehm & Associates

2:00pm
Security at the Top
Discover how to prevent mobile Web apps vulnerabilities.

Machina

IBM

Godfrey Chua
Godfrey Chua
Machina Research

Tim Hahn
Tim Hahn
Distinguished Engineer
IBM

Ask questions. Get Answers. Protect Your Assets.

Don’t allow your company to be vulnerable.


*Source- Ponemon Institute

Photos

IoT Evolution Expo Explained
in 60 Seconds or Less!


Important Links