IOT NEWS

Industrial IoT News

Industrial IoT Home

It's Time to Secure the Intelligent Edge. Learn How at IoT Evolution Expo 2020

By Ken Briodagh
February 10, 2020

IoT Evolution Expo 2020 is coming up fast, and we interviewed several of our speakers to get a bit of a preview of what to expect from their sessions.

Here, we interviewed speaker Larry Karisny, who will be in our Best Practices Theatre on Thursday afternoon, to dig deep into the Advantages of Securing the Intelligent Edge, at IoT Evolution Expo 2020, which is taking place February 11 to 14 in Ft. Lauderdale, Florida.

To attend this session, click here to register.

Here is a little preview of his thoughts:

IoT Evolution: What are some key ideas you plan to cover in your session?

Larry Karisny: IoT by design is in the security business. IoT security now has laws, mandates, standards, human and machine vulnerability and demanded requirements by IoT users prior to purchase. IoT has forced the entire Cyber Defense industry to offer deeper, faster and stronger security in a trustless model. IoT uses components of the most advanced Cyber Defense technologies (True Random Entropy, Micro-segmentation, Visualization and AI) in its product design. Leveraging the IoT security platform can attract new, additional and recurring customers to the IoT provider. Advanced IoT technologies will define the Cyber Defense industry from now to the Quantum Computer.

IoTE: What insights do you hope attendees will take home?

LK: IoT is the leader in cyber defense not the follower. The technical architecture of IoT forced the entire Cyber Defense industry to offer more advanced security. By design IoT is micro-segmented. This offers the capability of using advanced cyber defense technologies uniquely for the IoT application. Once demonstrated, the same advanced cyber defense technology can be added to the more complex system architectures. IoT security is a benefit that attracts new, additional and recurring IoT users to the IoT application.

IoTE: Can you identify a few important trends influencing your sector of the IoT which will shape the path of the industry? Why these?

LK: By law, mandate, standard and customer demand IoT must be secured. True Random Entropy, Micro-segmentation, Visualization and AI are used in the most advanced trends in Cyber Defense technologies. IoT uses components of these technologies that can be used in developing advanced IoT cyber defense. The deployment of advanced IoT Cyber Defense technologies will lead the Cyber Defense industry in superior security solutions. IoT and IoT security is the bridge to Quantum Computing.


IoTE: What are the biggest challenges facing the IoT right now?

LK: Deploying solid Cyber Defense technologies today for IoT.

IoTE: What are some strategies you recommend to overcome those challenges?

LK:

  • Partner with companies already offering advanced Cyber Defense security solutions for IoT.
  • Deploy Advanced Cyber Defense technologies in the Micro-segmented IoT application.
  • Follow industry standards offering migration paths to future IoT advanced security solutions.     

IoTE: Which vertical markets have the most to gain from IoT implementation? Which are leading and which are still behind the adoption curve?

LK: If a solid security platform is demonstrated, IIoT and Smart City Critical Infrastructure applications can most benefit from IoT applications. If not demonstrated some of these IoT applications by mandate cannot use IoT.   

IoTE: What sessions are you most looking forward to attending at the Expo? Why?

Intelligent Edge of Smart City

Understand applications and how to secure As a Service Smart City applications

Discuss: How Smart is the Edge

Security is in the IoT processor. This discussion will show the true edge.

Keynote by Schneider Electric - Transforming Industry with Digital Services: A Collaborative Industrial IoT Approach

Schneider Electric is number 1 in integrating complete critical infrastructure applications including the smart grid.

Discuss: Chips, Sensors, and Modules

Want to look deep into IoT security at the chip, sensor and module level.

Discuss: IIoT Security AI and ML beyond Identity

Interested in security practice beyond identity and auditing.

Register now for the IoT Evolution Expo and Get 20% off your full conference with code IoTTime and be there for all the information you need to drive your IoT strategy in 2020.   


Ken Briodagh is a storyteller, writer and editor with about two decades of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh

Editorial Director

SHARE THIS ARTICLE
Related Articles

ioXt Alliance Adds Four Authorized Labs to Certification Program

By: Ken Briodagh    7/2/2020

Expanded selection of Authorized Labs offer third-party validation and testing expertise: 7layers, DEKRA, DTG and NCC Group

Read More

How Can the IoT Improve Predictive Maintenance?

By: Megan Ray Nichols    7/2/2020

Factories avoid downtime by using maintenance strategies - like preventive maintenance - that can keep their equipment running as long as possible.

Read More

Equinix Expands Dallas Campus with Data Center and 5G Testing Center

By: Ken Briodagh    7/2/2020

Equinix has expanded its Dallas Infomart Data Center campus with the opening of a new $142 million International Business Exchange data center and 5G …

Read More

The Limits of RPA for Order Automation

By: Special Guest    7/2/2020

For any wholesale distributor or manufacturer, converting purchase orders into sales orders is a basic, daily process. But it doesn't have to be manua…

Read More

IoT Time Podcast S.5 Ep.24 IoTerop

By: Ken Briodagh    7/2/2020

In this episode of IoT Time Podcast, Ken Briodagh sits down with Steve Lurie, Marketing and product director, IoTerop, to talk about IoT Standards, Se…

Read More