22 November 201612:00 PM - 5:00 PM
The Clubhouse, 8 St James's Square, London, SW1Y 4JU
Speaker:
Various
As the Internet of Things approach grows, so does the concept Machine-to-Machine (M2M) learning. But what’s the difference between them and why does one need the other? The more devices that become digitally connected, the more we need better security practices and identity access management capabilities.
IoT and M2M; break them down and yes, there are similarities but where M2M utilises network resources in order to communicate with remote applications in order to control and monitor the environment, IoT takes it a step further and interconnects smart devices in the digital world. Add Internet protocols to M2M and it becomes a division of IoT, delivering enhanced vertical and horizontal visibility. But with the expansion of IoT, the need to protect company data and IP is as important as ever – security needs to be at the core of any IoT solution, as does managing the identities of users and consumers.
ZONE SE7EN will investigate the growth of IoT and its close relationship with M2M, discuss the differences and the similarities between the two concepts, review the impact of digital transformation and wearables on IoT, look at the key features of IoT, M2M, securing IoT devices and their respective operating systems, and identity access management for IoT users and consumers.
• The need for a common set of standards to help govern the growing need for IoT security.
• Cloud-based IoT platforms and connected devices.
• The rise of Low Power Wide Area Networks (LPWAN) as part of the IoT network.
• Adopting data-led devices to solve real time issues. Listening to customers and developing devices that are data-led to solve real-time issues.
• Securing multiple points of vulnerability for all IoT devices to protect data and identities against cyber threats.
• Why manufacturers of IoT devices and products, and the providers of the gateways that connect IoT devices, need to incorporate stronger security measures.
• The need for better identity access management for IoT devices and products to protect users and consumers against cyber threats and malicious malware.
Industries: Manufacturing, Healthcare, Wearables, Telecommunications, Automotive, Government, Energy, Transportation, Logistics, Education, M2M, Consumer Goods, Banking & Finance and Insurance.
CIOs, CISOs, CSOs, COOs, CTOs, Security & Risk Management, Business/IT security Alignment, IT/OT Security Integration, Heads of IAM, IAM Architects, Security Architects, Network Operators, Governance and Policy Setting, Heads of Connected Cars, Heads of Connected Homes, Heads of Data Science, DevOps Architects/Management, IoT Developers, IT Developers, Government Officials, Business Continuity and IT Disaster Recovery Managers, Governance, Data and Device Management, Risk Managers, Big Data Managers/Directors, Network Security Managers, Security Executives and Directors
Interested in attending a ZONE SE7EN event?
Our events offer the delegates and attendees the perfect opportunity of being involved in a truly networked, collaborative approach, delivering informed, dynamic answers to evolve your decision-making.
Register your interest to attend, and a member of our team will be in touch with you shortly.
Sponsorship positions are limited to just four sponsors per event. If you are interested in having the opportunity to discuss your IoT solution with key industry influencers and decision makers, a sponsorship opportunity may be right for you. Please visit our sponsorship page here for more information.
Event sponsors TBC.