Registration Header

REGISTER TODAY!

The IIoT Security Challenge

Start Date:12/18/2018

Start Time:11:00 AM EST

Duration:60 minutes

Abstract:

The Rise of the Robot Overlords: Clarifying the Industrial IoT - Part 5

Unfortunately, the IoT makes every part of nearly every system vulnerable to network attack. The IoT could easily be called the IoT the Internet of Targets. The IoT is a brave new world for risk management.  

Good security requires layers or “defense in depth.” Easy in principle, but not so easy in practice. Most layers are dependent on the hardware used: firewalls, network types or secure hosts. Security must be designed for every component. Each layer requires detailed analysis and forethought, a complex challenge. Since security architects are in short supply, these layered architectures leave many open attack surfaces.

The advent of data-centric technology offers a different approach − one that is both strong and easy.  Instead of securing the hardware concepts, data-centric security secures software-application interactions themselves. Databus security matches the databus architecture, crisply controlling access just as it controls dataflow regardless of the hardware implementation. It works despite changes in host location or types, despite changing or bridging networks, and despite changes in application participation. There’s no code to write; it doesn’t even have an API.

This session will study the unique power of adding data-centric security to an overall security architecture.

The Robot Overlords Series
The smart machine era will be the most disruptive in history.  Medical treatment systems, the power grid, manufacturing lines, process control, and transportation systems work today the same way they did 20 years ago.  But in the next few years, clever engineers in every industry will find a way to leverage the amazing change in compute power and networking. That feat will threaten everyone and everything that does not respond.
The rise of connected computing will rewrite vendor relationships, redefine profitability and re-imagine delivery from environment to cost to product. Today’s system designs must last decades. If you are a designer, your challenge is to look beyond today's experience into a future dominated by intelligent distributed computing…the Robot Overlords.

This series is presented by Stan Schneider, CEO of Real-Time Innovations, Inc. (RTI).  With over 1300 designs, RTI is the largest of the IIoT connectivity framework vendors.  RTI software runs the largest power plants in North America, connects perception to control in vehicles, coordinates combat management on US Navy ships, drives a new generation of medical robotics, controls hyperloop and flying cars, and provides 24x7 medical intelligence to hospital patients and emergency victims.
 
Stan also serves as Vice Chair of the Industrial Internet Consortium (IIC) Steering Committee.  The IIC is the largest of the Industrial IoT consortia, with over 250 members.
 
Stan serves on the advisory board for Industry’s largest event, the IoT Solutions World Congress. He received Embedded Computing Design’s Top Embedded Innovator Award in 2015 & was ranked #8 in IoTOne’s top-100 IIoT influencers in 2017.  Stan completed a PhD in EE/CS at Stanford with a thesis on autonomous systems at the Stanford Aerospace Robotics Laboratory.  

If you're already registered for the The IIoT Security Challenge webcast, click below:

ALREADY REGISTERED?

Speakers

Stan Schneider

Stan is CEO of Real-Time Innovations (RTI). RTI is the edge autonomy leader with over 1300 designs in Energy, Medical, Automotive, Transportation, and Defense. Stan is Vice Chair of the IIC and serves on the advisory board of the IoT Solutions World Congress. Stan has a PhD in EE/CS from Stanford.. 

First Name
Last Name
Email Address
Job Title
Role
Company
Industry
Address
City
State
Zip Code
Provinces
Work Phone
Country
OpenSystems Media and its affiliates may use the information you have provided to keep you informed about products, services and offerings:
Yes, by e-mail.Yes, by telephone.
Yes, by postal mail.No