Menu

The Industrial Internet of Things FEATURE NEWS

Identity Theft Shifts from the Consumer to Industrial Sector

By Ken Briodagh January 17, 2018

The IoT Evolution Expo and Industrial IoT Conference are coming up fast, and we interviewed our speakers to get a bit of a preview of what to expect from the conferences.

Here, we spoke to Nina Tucker, Co-Founder, Twin Oaks Computing, who will be a featured speaker in the following session during the week of education:

The Industrial Internet Security Concerns: Identity theft happens despite attempts to protect personal information, and it can be a devastating event for the individual. Cyber-attacks occur similarly in an enterprise or its Industrial Control System (ICS) architecture, also delivering devastating impacts for the success of the business. This session will address the current state of these threats, outline what technical solutions, either available now or under development, can be identified to close the gaps regarding cyber security. 

Here is a little preview of her thoughts:

IoT Evolution: What will be some key points you plan to hit in your session?
Nina Tucker: Why is cyber security such a hot topic in the IoT environment? What are common approaches for attack, and common ways to prevent those attacks? A look at one of the most robust standardized secure communications infrastructure (Data Distribution Service, or DDS), and how it's used in IoT systems.

IoTE: What new insights can attendees expect to take home from your session?
NT: For IoT system developers and manufactures: some new approaches for designing and developing secure systems. For IoT system users: security concepts and questions to ask the IoT manufacturers.

IoTE: Can you identify a few important trends influencing your sector of the IoT which will shape the path of the industry?
NT: I work primarily with industrial systems, often referred to as IIoT, or the Industrial Internet of Things. These companies are building medical devices used throughout hospitals, including surgical tools in operating rooms, designing the next generation electrical grid, building higher performance, high volume data acquisition systems, etc. The wide-spread trend in these environments is connecting systems that have been running for decades, unconnected. Adding connectivity allows the device or service provider to better support their customers, by making sure the system runs more efficiently, with better robustness, and better security.

IoTE: What are the biggest challenges facing the IoT? What are some important tools needed to overcome them?
NT: In my world, the biggest challenge is not "connecting" the components or devices in a system. That's easy - upgrade the device to have an Ethernet port, and there you go! The challenge is making these systems run reliably, efficiently, and be robust in the face of un-reliable networks, user error, and malicious attacks. Building reliable, robust, and secure connectivity between all the software running in the IoT system - that's the challenge.

This is where "communication middleware" comes into play. Commercial (and open source) communication middleware solutions provide this reliable, robust, secure framework for connecting all the software components across your distributed IoT system, allowing your software developers to focus on their area of expertise: surgical equipment, autonomous sweepers, pressure sensors, battery systems for renewable energy systems, etc.

IoTE: Which vertical markets have the most to gain from IoT implementation? Which are leading and which are still behind the adoption curve?
NT: I have seen examples of companies benefiting from making their systems more connected across all vertical markets. The potential exists just about everywhere.

To join Nina and all our other speakers at IoT Evolution Expo, January 22 to 25 at the Disney Contemporary Resort in Orlando, Florida, click here to register now.


Ken Briodagh is a writer and editor with more than a decade of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh

Editorial Director

SHARE THIS ARTICLE
Related Articles

IoT Time Podcast S.3 Ep.10 Netcracker

By: Ken Briodagh    3/29/2018

In this episode of IoT Time Podcast, Ken Briodagh sits down with Paul Hughes (@PHughesNC), Director of Strategy at Netcracker to talk about 5G impleme…

Read More

Smart Farming: How IIoT Is Making Agriculture More Sustainable

By: Special Guest    3/28/2018

The IIoT is driving a new industrial revolution - and this one's centered on the automation of industrial processes. All kinds of industries are affec…

Read More

IIC Releases Endpoint Security Best Practices

By: Chrissie Cluney    3/27/2018

Are you and your company interested in learning more about the IIoT to better your company's productivity? The Industrial Internet Consortium (IIC), t…

Read More

IoT Events Feature Healthcare, Smart City, Autonomous Vehicles and IIoT

By: Ken Briodagh    3/26/2018

The IoT is expanding in hundreds of new vertical directions, and upcoming events are focusing on some of the hottest: Smart City IIoT, Autonomous Vehi…

Read More

FogHorn Partners with Google Cloud to Deliver IIoT Solution

By: Ken Briodagh    3/22/2018

Foghorn Lighting Edge Intelligence platform with Google Cloud IoT Core will maximizes the value of industrial data on IoT devices

Read More