AGENDA

Thank you to All of IoT Evolution Expo's Attendees, Speakers, Sponsors and Exhibitors for Making the 2018 Orlando Event an Amazing One!
Stay tuned for details on the IoT Evolution Expo, January 28-31, 2019 in Fort Lauderdale, Florida.

Days


Tracks

Monday, January 22, 2018
1:00pm
Monday - 1/22/18
IoT Security Certification ()
IoT Security Basics
IOTSC-01
Silicon Labs
Lots of elements go into a discussion of security, including some personal concerns about privacy. When we talk about IoT devices that are distributed and designed to report critical information, redundancy is also a major concern. What represents the framework for IoT to be secure?
IoT Security Certification ()
Video Surveillance I
IOTSC-04
Dell OEM
Axis Communications
  IoT Security Certification
  IoT Security Certification
2:00pm
Monday - 1/22/18
IoT Security Certification ()
IoT Business Model Strategies
IOTSC-02
Unified Office
Scherer Communications
IoT Security Certification ()
Video Surveillance II
IOTSC-05
Dell OEM
Axis Communications
  IoT Security Certification
  IoT Security Certification
3:00pm
Monday - 1/22/18
IoT Security Certification ()
Device Security
IOTSC-03
Ice Miller LLP
G+D
ZOHO Corporation
Scherer Communications
The Internet of Things is bringing exciting new benefits to businesses and consumers across many different industries. It is also bringing a whole host of equally exciting, yet certainly challenging problems to solve - including security. If you are responsible for developing an IoT solution, you know it needs to be secure, but what does that mean and how do you go about achieving that security? In this session we will look at some of the key ingredients involved in securing your IoT solution from both the hardware and the software perspectives.
IoT Security Certification ()
Regulatory Rules & IoT
IOTSC-06
Global SCV
Drinker Biddle & Reath
  IoT Security Certification
  IoT Security Certification
4:00pm
Monday - 1/22/18
Special General Session ()
Birds of a Feather: NIST-Led Discussion on IoT Security and Privacy Risk Considerations
GS-01
NIST
Deloitte & Touche
NIST’s Cybersecurity for the Internet of Things (IoT) program supports the development and application of standards, guidelines, and related tools to improve the cybersecurity of connected devices and the environments in which they are deployed. By collaborating with stakeholders across government, industry, international bodies, and academia, the program aims to cultivate trust and promote U.S. leadership in IoT.
  Special General Session
5:30pm
Monday - 1/22/18
()
Welcome Networking Reception - All Attendees, Speakers, Exhibitors Invited
X-01
  
Tuesday, January 23, 2018
8:30am
Tuesday - 1/23/18
()
Continental Breakfast - Proper Badge Required
X-02
  
9:00am
Tuesday - 1/23/18
IoT Security 4.0 Conference ()
Role Based Access Control
IOTS-01
Crossfire Media
CyberBridge Group
Ayla Networks
It’s embarrassing how many times we end up reading about a sensor or a system has been breached and hackers use the back door to access consumer information. Part of the issue is that data is not mapped into models of access control. Hear about solutions that allow companies to secure the information and ensure that the data is not available to everyone.
  IoT Security 4.0 Conference
10:00am
Tuesday - 1/23/18
IoT Security 4.0 Conference ()
IoT Sensors: Hardened and Tested
IOTS-02
Cisco
IBM
Globalscape
Hewlett-Packard Enterprise
IoT device makers face a number of choices when it comes to securing their products. Often security decisions are limited to the needs and limitations of each product. That could, over time, lead to a fragmented set of technologies that need to be managed leading to higher costs. Secondly, security failures can occur at multiple points in a devices lifecycle. How does this impact device security? What are the core principles that all device OEMs must take into consideration to implement an IoT security Strategy and not just a point solution? Is there a framework that can be applied to make the right decision?
  IoT Security 4.0 Conference
11:00am
Tuesday - 1/23/18
Keynote Presentation ()
IoT Evolution Keynote Presentation by Cradlepoint: IoT for a Competitive Advantage? Strategic Networking Considerations to Accelerate Time-to-Value
K-01
Cradlepoint
Are you deploying IoT as a science project or for a competitive cost or revenue advantage? Join George Mulhern, CEO of Cradlepoint, as he shares strategic networking considerations to help organizations spend more time “consuming” technology and less time building it – greatly improving their time-to-value. Software-Defined technologies, elastic gateways, and 5G are among those strategic choices that could be the difference between a competitive advantage and a resource drain.
  Keynote Presentation
11:30am
Tuesday - 1/23/18
Keynote Presentation ()
IoT Evolution Keynote Presentation by Verizon: Barriers to IoT Adoption
K-02
Verizon
  Keynote Presentation
12:00pm
Tuesday - 1/23/18
()
Conference Luncheon Featuring IoT Implementation Awards - Proper Badges Required
X-03
Wind River
Telit
  
1:00pm
Tuesday - 1/23/18
IoT Security 4.0 Conference ()
Security at the Edge of IoT
IOTS-03
Cradlepoint
Integron
The exponential growth of connected devices operating at the edge of the network is creating a wide range of security concerns that require a new approach. As devices proliferate, it's getting harder to manage security credentials and software, monitor the security status, and provide cost-effective protection through traditional security model that rely on host-based protections and cloud security services. Fog computing—which distributes resources and services of computing, data storage, and smart networking close to end users—can provide a range of new security services at or nearer the endpoints to help address some of these challenges. This panel will discuss how fog computing can meet the stringent latency requirements for security-related processing in mission-critical systems such as industrial control systems and connected vehicles and how to overcome bandwidth constraints for cloud-based security services.
  IoT Security 4.0 Conference
2:00pm
Tuesday - 1/23/18
Special Panel Discussion ()
Analyze This
GS-02
James Brehm & Associates
151 Advisors
Crossfire Media
Harbor Research
ABI Research
Woodside Capital Partners
  Special Panel Discussion
3:00pm
Tuesday - 1/23/18
Keynote Presentation ()
Keynote Presentation by Intel
K-03
  Keynote Presentation
3:30pm
Tuesday - 1/23/18
Keynote Presentation ()
Keynote Presentation by McAfee
K-04
McAfee
  Keynote Presentation
4:00pm
Tuesday - 1/23/18
Special Panel Discussion ()
Money Matters
GS-03
James Brehm & Associates
Aegis
MVP Capital
Woodside Capital Partners
Capstone Partners
Thiel Advisors, Inc.
Drake Star Partners
Canaccord Genuity
  Special Panel Discussion
5:00-6:30pm
Tuesday - 1/23/18
()
Grand Opening Reception in Exhibit Hall
X-04
  
Wednesday, January 24, 2018
8:00am
Wednesday - 1/24/18
()
Continental Breakfast - Proper Badge Required
X-05
  
8:30am
Wednesday - 1/24/18
Special Panel Discussion ()
Women in IoT
GS-04
OpenFog Consortium
Innovation Women
Verizon Wireless
MapQuest
Telus
  Special Panel Discussion
9:30am
Wednesday - 1/24/18
Keynote Presentation ()
IoT Evolution Expo Keynote Presentation by Arm - Fogonomics: The Coming Era of Fog Computing in IoT
K-06
  Keynote Presentation
10:00am
Wednesday - 1/24/18
Keynote Presentation ()
Keynote Presentation
K-05
LoRa Alliance
  Keynote Presentation
11:00am-4:00pm
Wednesday - 1/24/18
()
Visit the IoT Evolution Exhibit Hall
X-06
  
12:00pm
Wednesday - 1/24/18
()
Lunch Tickets Provided in Exhibit Hall - Proper Badge Required
X-07
  
1:00pm
Wednesday - 1/24/18
IoT Security 4.0 Conference ()
IoT - The S is for Security
IOTS-04
Tempered Networks
Blue Ridge Networks
Verizon
People make jokes about IoT security, but the reality is that connectivity can be taken advantage of regardless of whether you deploy IoT solutions or not. How do companies identify and isolate sensors and systems that have back doors and represent threats to the entire network? Hear how companies can implement an IoT Security strategy that manages legacy as well as new opportunities.
  IoT Security 4.0 Conference
2:00pm
Wednesday - 1/24/18
IoT Security 4.0 Conference ()
The Whole City is Watching?
IOTS-05
Coris
Axis Communications
Surveillance systems have been deployed in every major city, yet we now have less than 10% of the video is watched by a human. How do we move surveillance to the next level where systems can make us safer and deter crime?
  IoT Security 4.0 Conference
3:00pm
Wednesday - 1/24/18
IoT Security 4.0 Conference ()
Avoiding the IoT Zombie Apocalypse
IOTS-06
Infineon and Trusted Computing Group
What are the business and technical implications of new attacks like the CIA’s CherryBlossom toolkit and Mirai? These toolkits go after IoT devices, routers, and gateways. They use sophisticated techniques to compromise these systems, turn them into zombies, and enslave them into botnet armies that are rented out for DDoS attacks. Thus, even mighty giants like Twitter and Netflix have laid low. Hear about the new practices that use hardware security to protect the next generation of IoT devices and routers against such attacks. How can IoT avoid being part of the problem?
  IoT Security 4.0 Conference
4:15pm
Wednesday - 1/24/18
Keynote Presentation ()
Keynote Presentation by ServiceMax from GE Digital: IoT Applications Rising Above the IoT Platform
K-08
ServiceMax from GE Digital
As the Internet of Things moves from hype to adoption and productivity, it’s time to figure out what is IoT actually good for. Connecting equipment and devices over the Internet enables us to collect a lot of useful data. But what for? Gaining visibility and actionable insight sounds interesting but the real benefit comes from being able to act upon that insight. This presentation will discuss how IoT applications deliver tangible value to the equipment manufacturers and operators alike.
  Keynote Presentation
4:45pm
Wednesday - 1/24/18
Keynote Presentation ()
IoT Evolution Expo Keynote Presentation by IBM
K-09
Watson IoT Platform, IBM
  Keynote Presentation
5:15pm
Wednesday - 1/24/18
Keynote Presentation ()
Keynote Presentation
K-10
  Keynote Presentation
5:30pm
Wednesday - 1/24/18
()
IoT Security 4.0 Conference Party - Featuring Great Dining Stations, Drinks, Networking
X-08
  
Thursday, January 25, 2018
8:30pm
Thursday - 1/25/18
()
Continental Breakfast - Proper Badge Required
X-09
  
9:00am
Thursday - 1/25/18
IoT Security 4.0 Conference ()
The Birds of a Feather Security Q&A
IOTS-07
Infineon and Trusted Computing Group
Until recently most security experts have had open and frank conversations in public about threats. These days’ companies have a tendency to hide their pain. We are hosting this open forum for everyone to improve their cyber security plans. No question is stupid, so ask away. We have gathered some of our best thought leaders into the room to answer any questions attendees have about their unique situations.
  IoT Security 4.0 Conference
10:00am
Thursday - 1/25/18
IoT Security 4.0 Conference ()
IoT Security Strategies
IOTS-08
ProjectSafety.org
Syniverse
  IoT Security 4.0 Conference
11:00am-2:00pm
Thursday - 1/25/18
()
IoT Evolution Exhibit Hall Open
X-10
  
11:15am
Thursday - 1/25/18
Keynote Presentation ()
Keynote Presentation in Expo Hall Theatre
K-07
Axis Communications
  Keynote Presentation
11:45am
Thursday - 1/25/18
Special Panel Discussion ()
Conference Wrap-Up in Expo Hall Theatre
GS-06
  Special Panel Discussion

 

ASSOCIATION PARTNERS

ANALYST PARTNERS