AGENDA

Days


Tracks

Monday, January 22, 2018
4:00pm
Monday - 1/22/18
Special General Session ()
IoT Connectivity Showcase
GS-01
  Special General Session
5:30pm
Monday - 1/22/18
()
Networking Reception & Connectivity Showcase Awards
X-01
  
Tuesday, January 23, 2018
8:30am
Tuesday - 1/23/18
()
Continental Breakfast - Proper Badge Required
X-02
  
9:00am
Tuesday - 1/23/18
IoT Security 4.0 Conference ()
Role Based Access Control
IOTS-01
MACH 37
Mobelisk
Ayla Networks
It’s embarrassing how many times we end up reading about a sensor or a system has been breached and hackers use the back door to access consumer information. Part of the issue is that data is not mapped into models of access control. Hear about solutions that allow companies to secure the information and ensure that the data is not available to everyone.
  IoT Security 4.0 Conference
10:00am
Tuesday - 1/23/18
IoT Security 4.0 Conference ()
IoT Sensors: Hardened and Tested
IOTS-02
IBM
Globalscape
Hewlett-Packard Enterprise
IoT device makers face a number of choices when it comes to securing their products. Often security decisions are limited to the needs and limitations of each product. That could, over time, lead to a fragmented set of technologies that need to be managed leading to higher costs. Secondly, security failures can occur at multiple points in a devices lifecycle. How does this impact device security? What are the core principles that all device OEMs must take into consideration to implement an IoT security Strategy and not just a point solution? Is there a framework that can be applied to make the right decision?
  IoT Security 4.0 Conference
11:00am
Tuesday - 1/23/18
Keynote Presentation ()
IoT Evolution Keynote Presentation by Cradlepoint
K-01
Cradlepoint
  Keynote Presentation
11:30am
Tuesday - 1/23/18
Keynote Presentation ()
IoT Evolution Keynote Presentation by Verizon
K-02
Verizon Wireless
  Keynote Presentation
12:00pm
Tuesday - 1/23/18
()
Conference Luncheon - Proper Badges Required
X-03
  
1:00pm
Tuesday - 1/23/18
IoT Security 4.0 Conference ()
Security at the Edge of IoT
IOTS-03
The exponential growth of connected devices operating at the edge of the network is creating a wide range of security concerns that require a new approach. As devices proliferate, it's getting harder to manage security credentials and software, monitor the security status, and provide cost-effective protection through traditional security model that rely on host-based protections and cloud security services. Fog computing—which distributes resources and services of computing, data storage, and smart networking close to end users—can provide a range of new security services at or nearer the endpoints to help address some of these challenges. This panel will discuss how fog computing can meet the stringent latency requirements for security-related processing in mission-critical systems such as industrial control systems and connected vehicles and how to overcome bandwidth constraints for cloud-based security services.
  IoT Security 4.0 Conference
2:00pm
Tuesday - 1/23/18
Special Panel Discussion ()
Analyze This
GS-02
James Brehm & Associates
151 Advisors
Crossfire Media
Harbor Research
ABI Research
  Special Panel Discussion
3:00pm
Tuesday - 1/23/18
Keynote Presentation ()
Keynote Presentation by Intel
K-03
  Keynote Presentation
3:30pm
Tuesday - 1/23/18
Keynote Presentation ()
Keynote Presentation by McAfee
K-04
McAfee
  Keynote Presentation
4:00pm
Tuesday - 1/23/18
Special Panel Discussion ()
Money Matters
GS-03
James Brehm & Associates
MVP Capital
Woodside Capital Partners
Thiel Advisors, Inc.
Drake Star Partners
Canaccord Genuity
  Special Panel Discussion
5:00-6:30pm
Tuesday - 1/23/18
()
Grand Opening Reception in Exhibit Hall
X-04
  
Wednesday, January 24, 2018
8:00am
Wednesday - 1/24/18
()
Continental Breakfast - Proper Badge Required
X-05
  
8:30am
Wednesday - 1/24/18
Special Panel Discussion ()
Women in IoT
GS-04
OpenFog Consortium
Innovation Women
Verizon Wireless
MapQuest
Telus
  Special Panel Discussion
9:30am
Wednesday - 1/24/18
Keynote Presentation ()
IoT Evolution Expo Keynote Presentation by Arm - Fogonomics: The Coming Era of Fog Computing in IoT
K-06
  Keynote Presentation
10:00am
Wednesday - 1/24/18
Keynote Presentation ()
Keynote Presentation
K-05
  Keynote Presentation
11:00am-4:00pm
Wednesday - 1/24/18
()
Visit the IoT Evolution Exhibit Hall
X-06
  
12:00pm
Wednesday - 1/24/18
()
Lunch Tickets Provided in Exhibit Hall - Proper Badge Required
X-07
  
1:00pm
Wednesday - 1/24/18
IoT Security 4.0 Conference ()
IoT - The S is for Security
IOTS-04
Cradlepoint
People make jokes about IoT security, but the reality is that connectivity can be taken advantage of regardless of whether you deploy IoT solutions or not. How do companies identify and isolate sensors and systems that have back doors and represent threats to the entire network? Hear how companies can implement an IoT Security strategy that manages legacy as well as new opportunities.
  IoT Security 4.0 Conference
2:00pm
Wednesday - 1/24/18
IoT Security 4.0 Conference ()
Asset Management & Surveillance
IOTS-05
Crimes of convenience can occur because things of value are neglected. IoT can be used to determine the position of systems and to monitor assets with GeoFencing and thereby reduce the opportunity for theft. This session talks about the practical aspects of using asset management to protect corporate inventory as well as business and institutional property.
  IoT Security 4.0 Conference
3:00pm
Wednesday - 1/24/18
IoT Security 4.0 Conference ()
Avoiding the IoT Zombie Apocalypse
IOTS-06
Infineon and Trusted Computing Group
What are the business and technical implications of new attacks like the CIA’s CherryBlossom toolkit and Mirai? These toolkits go after IoT devices, routers, and gateways. They use sophisticated techniques to compromise these systems, turn them into zombies, and enslave them into botnet armies that are rented out for DDoS attacks. Thus, even mighty giants like Twitter and Netflix have laid low. Hear about the new practices that use hardware security to protect the next generation of IoT devices and routers against such attacks. How can IoT avoid being part of the problem?
  IoT Security 4.0 Conference
4:15pm
Wednesday - 1/24/18
Keynote Presentation ()
Keynote Presentation
K-08
  Keynote Presentation
4:45pm
Wednesday - 1/24/18
Keynote Presentation ()
IoT Evolution Expo Keynote Presentation by IBM
K-09
Watson IoT Platform, IBM
  Keynote Presentation
5:15pm
Wednesday - 1/24/18
Keynote Presentation ()
Keynote Presentation
K-10
  Keynote Presentation
8:00pm
Wednesday - 1/24/18
()
IoT Conference Party
X-08
  
Thursday, January 25, 2018
8:30pm
Thursday - 1/25/18
()
Continental Breakfast - Proper Badge Required
X-09
  
9:00am
Thursday - 1/25/18
IoT Security 4.0 Conference ()
The Birds of a Feather Security Q&A
IOTS-07
Infineon and Trusted Computing Group
Until recently most security experts have had open and frank conversations in public about threats. These days’ companies have a tendency to hide their pain. We are hosting this open forum for everyone to improve their cyber security plans. No question is stupid, so ask away. We have gathered some of our best thought leaders into the room to answer any questions attendees have about their unique situations.
  IoT Security 4.0 Conference
10:00am
Thursday - 1/25/18
IoT Security 4.0 Conference ()
IoT Security Strategies
IOTS-08
BostonBase Inc.
ProjectSafty.org
  IoT Security 4.0 Conference
11:00am-2:00pm
Thursday - 1/25/18
()
IoT Evolution Exhibit Hall Open
X-10
  
11:15am
Thursday - 1/25/18
Keynote Presentation ()
Keynote Presentation in Expo Hall Theatre
K-07
Cisco Systems
  Keynote Presentation
11:45am
Thursday - 1/25/18
Special Panel Discussion ()
Conference Wrap-Up in Expo Hall Theatre
GS-06
  Special Panel Discussion

 

ASSOCIATION PARTNERS

ANALYST PARTNERS