September 28 @ 4:00 pm
Security by design and best practices along the entire IoT chain
The session examines the different security aspects that affect an IoT project starting from how to guarantee the protection of connections but, also and above all, how to guarantee the integrity, confidentiality and availability of data at every stage of the life cycle of the projects .
Chairperson: Simone Romano, Developer Community Growth, IoTeX
🟢 4:00 pm Introductory speech
Simone Romano, Developer Community Growth, IoTeX
🟢 4:15 Substation Level Monitoring: Decentralized OT threat detection to master new challenges for complex energy supply systems
Silvia Machmer, Business Development, Rhebo
Nowadays centralized monitoring is not enough to guarantee an early detection of attacks on all levels. The power grid is becoming fragmented due to the integration of municipalities, renewable energy resources and the construction of new substations often located far away from the central control room causing the increasing need for a real time 360° visibility from the control room to the substation.
🟢 4:30 pm Securing Smart Cities: the Cyber Immune approach
Marat Nuriev, IoT Business Development Manager, KasperskyOS
🟢 4:45 pm Embedded IoT and Cybersecurity, do you Trust your Supply Chain?
Ronny Tittoto, ESE Security Function Group European team leader, Microchip Technology
Today, designing embedded IoT systems cannot ignore compliance with cybersecurity regulations and standards. However, it is not enough to design secure devices, it is also necessary to protect the entire production process, supply chain management and after-sales. More than 62% of cyberattacks exploit the trust of customers in their suppliers.
In this session, Microchip Technology, a leading semiconductor company, introduces innovative services aimed at guaranteeing cybersecurity throughout the full life cycle of connected embedded devices.
🟢 5:00 pm Closing remarks – end of session
📌 REGISTER NOW! Only registrants will get access to the live webinar and (re-) play it in the following 30 days!
Attendance in person is reserved for end-user companies and requires a specific invitation.
If you are interested in participating in the presence please send an e-mail to email@example.com .