Strategies for IoT Security: What are the Risks and the Solutions?

By Ken Briodagh January 05, 2018

The IoT Evolution Expo is coming up fast, and we interviewed our speakers to get a bit of a preview of what to expect from the conference.

Here, we spoke to Lawrence Karisny, Director, ProjectSafety, who will be a featured speaker in the following session during the week of education:

IoT Security Strategies

Here is a little preview of his thoughts:

IoT Evolution: What will be some key points you plan to hit in your session?
Lawrence Karisny: How IoT not only needs to address cybersecurity but how the industry itself is self-regulating and coming up with innovations in that will help the entire cybersecurity industry.

IoTE: What new insights can attendees expect to take home from your session?
LK: IoT is the new edge or endpoint in security and deep learning artificial intelligence. The small processor and memory capacity of IoT will require new ways of authenticating, auditing and securing these endpoints. I will be covering technologies capable offering post quantum and deep learning technologies capable of addressing these requirements.

IoTE: Can you identify a few important trends influencing your sector of the IoT which will shape the path of the industry? Why these?
LK: The new trend is that IoT is getting serious about security and customers will pay for this security. There are also government agencies ready to regulate the industry if the industry does not address security within the industry itself.

IoTE: What are the biggest challenges facing the IoT? What are some important tools needed to overcome them?
LK: I will cover all current security vulnerabilities with IoT, current breach statistics and technologies capable of stopping these breaches.

IoTE: Which vertical markets have the most to gain from IoT implementation? Which are leading and which are still behind the adoption curve?
LK: If security is not addressed in IoT, then even the most successful implementation could be stopped. This has already been seen in critical infrastructure IoT applications with regulators ready to block IoT if security cannot be validated. If you behind the curve in IoT security you are behind the curve in IoT adoption.

IoTE: What session(s) (other than yours) are you most looking forward to attending at the Expo? Why?
LK: Blockchain certification. I will be addressing blockchain in IoT in my session. It will be interesting to see what the certification covers.

IoT in the Channel. It will be interesting to see how IoT will offer the expertise in channel distribution.

To join Lawrence Karisny and all our other speakers at IoT Evolution Expo, January 22 to 25 at the Disney Contemporary Resort in Orlando, Florida, click here to register now.

Ken Briodagh is a writer and editor with more than a decade of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh

Editorial Director

Related Articles

Exploring IoT Strategies: Service Providers Pursue Revenue Multiple Paths

By: Ken Briodagh    4/24/2018

A new Ericsson study provides insights on IoT value chain positioning from 20 leading telecom service providers globally as they engage with, and posi…

Read More

OSIsoft Collaborates with AWS on Analytics and Releases New PI Integrator Edition

By: Ken Briodagh    4/24/2018

OSIsoft has announced a collaboration with AWS to develop services and capabilities to make it easier for customers to run analyses on industrial data…

Read More

Ostendio and ComplianceForge Form New Strategic Partnership

By: Ken Briodagh    4/24/2018

Companies partner to offer an easier way to maintain compliance with changing cybersecurity regulations and requirements

Read More

How AI Makes the Empire State Building Smart

By: Special Guest    4/24/2018

The Empire State Building in New York City celebrates its 90-year anniversary soon and it is just getting smarter, proving New York is one of the smar…

Read More

GlobalSign Integrates Cloud PKI Solution with Arm Mbed Cloud

By: Ken Briodagh    4/24/2018

Enables third-party Arm developers to quickly and easily automate the issuance of digital certificates

Read More