Consumer-oriented connected devices are flooding the market, and many of the devices lack basic security protections. The issue has serious consequences for device manufacturers, consumers, and the connect infrastructure. Both the Federal Trade Commission and private attorneys have sued device manufacturers for
Selling security products and services, like insurance, home security systems, and even preventative medicine, often depends on vendors persuading the customer that they are at great risk, and playing on their fears. For IoT products, is that risk real? Have security vendors
More than 70 percent of IoT devices are vulnerable to cyber attack (source: HP), yet a majority of businesses do not plan to take steps to secure and protect IoT applications in the next 12 months (source: PWC). New and emerging cyber
Learn about building an IOT prototype and what technologies, use cases, and platform you would want to consider. Learn about the challenges and direction from a storyline experience. How to utilize your prototype as a learning experience and as a sales tool?
With the Internet of Things (IoT), essentially everything becomes a computer. We know that computers can be hacked. This means that everything can be hacked including cars, home appliances, medical devices and more. This session will give examples of IoT hacks and
The field implementation and refined application of AI and IoT in 2018 will likely see many businesses face unique compliance and security requirements arising from regulatory initiatives. This presentation will examine the impact to businesses from meeting regulatory compliance related to innovation,
The car is quickly becoming a system of highly complex, converged networks, consisting of the onboard internal network that operates the car, the external communications networks that provide a host of productivity, entertainment and commercial services, and lastly the extravehicular network that
Healthcare, consumer electronics, automotive, industrial, payments and numerous other verticals are developing smart, connected devices that rely on an IoT infrastructure. Security needs to be built-in at the device level to deliver safe and reliable IoT services. There is already evidence of