Sessions » Securing the Internet of Things

Panel: Securing the Internet of Things

Day 3 - May 2



Building IoT assets from the ground up
Kabir Kasargod, Senior Director, Business Development, Qualcomm Cyber Security Solutions, USA

The Internet of Things (IoT) is an opportunity to boost economic progress and improve lives. However, it also brings a new set of challenges as it involves a greater diversity of mission-critical services and devices where high reliability is required. For example, safety-related vehicle systems, industrial controls, drones operating in controlled airspace or near populated areas, and many medical applications are all mission-critical services. While connectivity and computational requirements of these IoT devices vary, they all have a common need: strong security.

A solid security approach requires a combination of hardware-based security features, tightly integrated with the software, communication protocols, applications and data center. Industry collaboration across all verticals IoT touches is critical, as no company can address this challenge on its own.

In this session, we will discuss the vulnerabilities that these IoT devices pose, provide insight in to how the industry can partner to address these challenges, and focus on how securing new devices at the hardware level is essential to securing the overall system.

•    Overview of the current state of the industry and 5G’s expected impacts;
•    Potential IoT threats and how these threats can actually be turned into security assets;
•    Our view on how security starts at the core and needs to be woven throughout the system to create a secure ecosystem of connected devices.

Ambient awareness: Tapping into the Internet of Things (IoT) to strengthen security
Matthew Pruitt, Chief Federal Solutions Architect, NEC Corporation of America, USA

In the ever-growing IoT world, we are as connected as ever. Leveraging IoT sensors, we can increase security while making the screening process easier, leading to a frictionless and secure world. The pervasive data and intelligence from IoT sensors, such as smart phones, smart watches, IP cameras, etc., can be exploited to not just investigate an event, but also predict, forecast and stop potential threats. By combining big data with advanced analytics, we can combine information to create a more complete profile of our surroundings for situational awareness. This data can then be processed to make it easier to review and react, even automatically. This talk will explore how we connect to the IoT world to create better models for ambient awareness, and how that data can be shared to create a more complete picture of the world around us so that we can react quicker while maintaining a frictionless experience for everyone.

Where does authentication exist in an M2M universe?
Phillip M. Dunkelberger, President and CEO, Nok Nok Labs, USA

The Internet of Things (IoT) is already upon us.  Everything connects from my car, to my thermostat, to my vacuum, to the solar panels on my roof. When machine talks to machine, the potential for coordination, optimization and analysis dwarfs anything that has come before. But where does authentication come in? On the IoT, can anyone tell you’re a refrigerator?

•    What is the danger of an unsecured network?
•    How is the Internet of Things being secured today?
•    How could authentication in IoT work? Machine-to-Machine, or Human-to-Machine.
•    Real world examples of Human-to-Machine Authentication: Gallagher Case Study.

GlobalPlatform: Securing the IoT Landscape
Kevin Gillick, Executive Director, GlobalPlatform, USA

Until recently, hackers had little motivation to attack IoT technologies. But now the IoT is achieving mass-market status, billions of new security devices hosting personal data are coming to market, and hackers are adjusting their priorities accordingly. Today’s would-be hackers will be quick to identify points of weakness and exploit them to achieve financial gains and cause brand damage. Device manufacturers are now bound to data privacy regulation and end-user expectation on service continuity.

A key challenge for the IoT community when it comes to security is that IoT incorporates a broad spectrum of markets and each needs to retain its aggressive innovation cycle. As such, each market will assess and evaluate security differently in relation to its own products and services. Herein lies the danger. Hackers often exploit basic and benign services that have limited or no security to attack a sensitive application. As IoT connects many components, businesses and services, a baseline of security standardization is therefore needed to build a chain-of-trust, which can then be layered with further security standards for more sensitive services.

Across the board, the IoT industry needs to embrace and implement security standards to ensure it can fully maximize market opportunities. Security is the foundation on which to build this next generation of innovation which offers limitless potential.

Industry association, GlobalPlatform, develops specifications that enable collaborative and open ecosystems where digital services and devices can be trusted and managed securely while privacy is supported.

Within this presentation, GlobalPlatform will explain:
•    The necessary core elements needed to protect digital assets and their associated security services;
•    GlobalPlatform’s role in standardizing the deployment and remote management of new IoT services while ensuring service security and isolation;
•    The case for certification of IoT security components.

Questions and Answers

Share this page :
Follow us on :

Event Powered By

see more

Platinum Sponsor

see more

Gold Sponsors

see more

Silver Sponsors

see more

Bronze Sponsor

see more


see more

Supporting Associations

see more

Premier Partners

see more

Media Partners

see more