Menu

EDGE FEATURE NEWS

It's Time to Secure the Intelligent Edge. Learn How at IoT Evolution Expo 2020

By Ken Briodagh February 10, 2020

IoT Evolution Expo 2020 is coming up fast, and we interviewed several of our speakers to get a bit of a preview of what to expect from their sessions.

Here, we interviewed speaker Larry Karisny, who will be in our Best Practices Theatre on Thursday afternoon, to dig deep into the Advantages of Securing the Intelligent Edge, at IoT Evolution Expo 2020, which is taking place February 11 to 14 in Ft. Lauderdale, Florida.

To attend this session, click here to register.

Here is a little preview of his thoughts:

IoT Evolution: What are some key ideas you plan to cover in your session?

Larry Karisny: IoT by design is in the security business. IoT security now has laws, mandates, standards, human and machine vulnerability and demanded requirements by IoT users prior to purchase. IoT has forced the entire Cyber Defense industry to offer deeper, faster and stronger security in a trustless model. IoT uses components of the most advanced Cyber Defense technologies (True Random Entropy, Micro-segmentation, Visualization and AI) in its product design. Leveraging the IoT security platform can attract new, additional and recurring customers to the IoT provider. Advanced IoT technologies will define the Cyber Defense industry from now to the Quantum Computer.

IoTE: What insights do you hope attendees will take home?

LK: IoT is the leader in cyber defense not the follower. The technical architecture of IoT forced the entire Cyber Defense industry to offer more advanced security. By design IoT is micro-segmented. This offers the capability of using advanced cyber defense technologies uniquely for the IoT application. Once demonstrated, the same advanced cyber defense technology can be added to the more complex system architectures. IoT security is a benefit that attracts new, additional and recurring IoT users to the IoT application.

IoTE: Can you identify a few important trends influencing your sector of the IoT which will shape the path of the industry? Why these?

LK: By law, mandate, standard and customer demand IoT must be secured. True Random Entropy, Micro-segmentation, Visualization and AI are used in the most advanced trends in Cyber Defense technologies. IoT uses components of these technologies that can be used in developing advanced IoT cyber defense. The deployment of advanced IoT Cyber Defense technologies will lead the Cyber Defense industry in superior security solutions. IoT and IoT security is the bridge to Quantum Computing.


IoTE: What are the biggest challenges facing the IoT right now?

LK: Deploying solid Cyber Defense technologies today for IoT.

IoTE: What are some strategies you recommend to overcome those challenges?

LK:

  • Partner with companies already offering advanced Cyber Defense security solutions for IoT.
  • Deploy Advanced Cyber Defense technologies in the Micro-segmented IoT application.
  • Follow industry standards offering migration paths to future IoT advanced security solutions.     

IoTE: Which vertical markets have the most to gain from IoT implementation? Which are leading and which are still behind the adoption curve?

LK: If a solid security platform is demonstrated, IIoT and Smart City Critical Infrastructure applications can most benefit from IoT applications. If not demonstrated some of these IoT applications by mandate cannot use IoT.   

IoTE: What sessions are you most looking forward to attending at the Expo? Why?

Intelligent Edge of Smart City

Understand applications and how to secure As a Service Smart City applications

Discuss: How Smart is the Edge

Security is in the IoT processor. This discussion will show the true edge.

Keynote by Schneider Electric - Transforming Industry with Digital Services: A Collaborative Industrial IoT Approach

Schneider Electric is number 1 in integrating complete critical infrastructure applications including the smart grid.

Discuss: Chips, Sensors, and Modules

Want to look deep into IoT security at the chip, sensor and module level.

Discuss: IIoT Security AI and ML beyond Identity

Interested in security practice beyond identity and auditing.

Register now for the IoT Evolution Expo and Get 20% off your full conference with code IoTTime and be there for all the information you need to drive your IoT strategy in 2020.   


Ken Briodagh is a storyteller, writer and editor with about two decades of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

ZEDEDA Certified Edge Computing Associate Certification to Support Growing Uses of Edge Computing

By: Alex Passett    9/6/2023

The new ZCEA certification from ZEDEDA is available through the company's Edge Academy and provides fundamental knowledge about the many benefits of e…

Read More

T-Mobile and Google Cloud Partner to Advance 5G and Edge Compute Possibilities

By: Alex Passett    6/15/2023

T-Mobile and Google Cloud are helping customers embrace next-gen 5G use cases; applications like AR/VR experiences, for example.

Read More

Aptiv PLC Acquires Wind River Systems to Enhance Software-Defined Vehicles

By: Alex Passett    1/5/2023

Dublin-based automotive technology supplier Aptiv PLC has acquired California-based cloud software and intelligent edge company Wind River Systems.

Read More

Driver Safety and Costs Keep Decision Makers Awake

By: Greg Tavarez    12/15/2022

The two things that are top of mind for SMB fleets are driver safety and financial concerns.

Read More

Tomahawk Hosts Microsoft Azure SDK on KxM Body-Worn Edge Processor

By: Stefania Viscusi    11/10/2022

Tomahawk Robotics, a provider of common control solutions, has successfully hosted Microsoft Azure SDK on its KxM edge device.

Read More