|CONNECT SECURITY World||Innovation Live|
PLENARY GRAND OPENING
SECURING GLOBALLY CONNECTED SOCIETY
2.00pm: EXHIBITION OPENING
Implementation & Ecosystem
|Rethinking Security Approach:
360° Views on IoT Security
|Automotive||Exhibition & Demos|
New SoC Design
Exhibition & Demos
|AWARD CEREMONY – GALA EVENING|
|New Industry Models||Exhibition & Demos, Business meetings|
TEE & TPM for IoT Security
|Exhibition & Demos, Business meetings|
Today’s dynamic nature of organizations contributes to complexity for monitoring and controlling access and identity cyber-risks. Solution: Apply continuous learning, reasoning and human interact-ability to Identity and Access management domain.
Mr. Went will present his holistic view on ‘identity’, from the why an identity, the impact of no identity, the right to an identity and the ‘foodchain’ of an identity. The latter is relevant in that there are layers of identity, from ‘simple’ breeder documents, to national ID documents to international (traveler) documents. Conventionally international (traveler) documents are physical documents like a passport, but ‘blockchain’ could be a consideration here.
Blockchains have the potential to revolutionize business on the Internet and will undoubtedly impact the identity management world. However, the nature of this impact is not yet clear. This panel will explore the intersection of blockchain technology and identity management:
|Track 1: Technology Advances|
|Track 2: Implementation & Ecosystem|
Discussions over IoT security often remain stuck between the sensational “that big thing got broken” and the trivial “IoT security is a big issue”, but it often remains hard to see clearly where the problem is. This panel will look at the source of the security problem: threats. A threat analysis is often considered as the first step in the establishment of a sound security strategy. Here, the panellists will confront their respective threat analyses:
– What are their vision of the threats facing the IoT industry
– How do they mitigate these threats
– What are the strong trends emerging
Protecting the data with adequate security means also protecting the privacy of customers, citizens, friends…With billions connected smart objects comes the creation of massive data collection from which personal information could be derived from for various unwanted purposes.
– How to build privacy engineering into the R&D process for IoT?
– What are the appropriate frameworks and standards for IoT developers and implementers in IoT enabled companies?
– How to ensure the user’s awareness and control of privacy risks?
In a rapidly evolving world where contactless cards are ubiquitous and most wearables need to be fun, connected and trendy, payment is a new way to play.
Device manufacturers and banking service providers are increasingly faced with challenges to offer payment services that ensure security and flexibility as well as a fast time to market at little cost.
After a brief overview of the market and actors, we will analyze the necessary technological bricks and their availability to help developers find the quickest route to mass deployment of secure wearable solutions.
Every day, the world is becoming “smarter”: more data related to us, our health, our environment, and our way of life are measured and recorded with and without our consent.
These data are analyzed in real time and artificial intelligence systems use this information to make automatic decisions including critical ones.
Ensuring the authenticity and privacy of these data becomes crucial in all activities. Security policies are no longer an option; they are a must!
Secure elements such as STSAFE are part of the solution to ensure your devices are authenticated and your services remain robust against attack and safeguard your privacy.
Speaker: Sridhar Bhupathiraju