iot health

IoT Evolution Health News

IoT Evolution Health Home

It's Time to Secure the Intelligent Edge. Learn How at IoT Evolution Expo 2020

By Ken Briodagh
February 10, 2020

IoT Evolution Expo 2020 is coming up fast, and we interviewed several of our speakers to get a bit of a preview of what to expect from their sessions.

Here, we interviewed speaker Larry Karisny, who will be in our Best Practices Theatre on Thursday afternoon, to dig deep into the Advantages of Securing the Intelligent Edge, at IoT Evolution Expo 2020, which is taking place February 11 to 14 in Ft. Lauderdale, Florida.

To attend this session, click here to register.

Here is a little preview of his thoughts:

IoT Evolution: What are some key ideas you plan to cover in your session?

Larry Karisny: IoT by design is in the security business. IoT security now has laws, mandates, standards, human and machine vulnerability and demanded requirements by IoT users prior to purchase. IoT has forced the entire Cyber Defense industry to offer deeper, faster and stronger security in a trustless model. IoT uses components of the most advanced Cyber Defense technologies (True Random Entropy, Micro-segmentation, Visualization and AI) in its product design. Leveraging the IoT security platform can attract new, additional and recurring customers to the IoT provider. Advanced IoT technologies will define the Cyber Defense industry from now to the Quantum Computer.

IoTE: What insights do you hope attendees will take home?

LK: IoT is the leader in cyber defense not the follower. The technical architecture of IoT forced the entire Cyber Defense industry to offer more advanced security. By design IoT is micro-segmented. This offers the capability of using advanced cyber defense technologies uniquely for the IoT application. Once demonstrated, the same advanced cyber defense technology can be added to the more complex system architectures. IoT security is a benefit that attracts new, additional and recurring IoT users to the IoT application.

IoTE: Can you identify a few important trends influencing your sector of the IoT which will shape the path of the industry? Why these?

LK: By law, mandate, standard and customer demand IoT must be secured. True Random Entropy, Micro-segmentation, Visualization and AI are used in the most advanced trends in Cyber Defense technologies. IoT uses components of these technologies that can be used in developing advanced IoT cyber defense. The deployment of advanced IoT Cyber Defense technologies will lead the Cyber Defense industry in superior security solutions. IoT and IoT security is the bridge to Quantum Computing.


IoTE: What are the biggest challenges facing the IoT right now?

LK: Deploying solid Cyber Defense technologies today for IoT.

IoTE: What are some strategies you recommend to overcome those challenges?

LK:

  • Partner with companies already offering advanced Cyber Defense security solutions for IoT.
  • Deploy Advanced Cyber Defense technologies in the Micro-segmented IoT application.
  • Follow industry standards offering migration paths to future IoT advanced security solutions.     

IoTE: Which vertical markets have the most to gain from IoT implementation? Which are leading and which are still behind the adoption curve?

LK: If a solid security platform is demonstrated, IIoT and Smart City Critical Infrastructure applications can most benefit from IoT applications. If not demonstrated some of these IoT applications by mandate cannot use IoT.   

IoTE: What sessions are you most looking forward to attending at the Expo? Why?

Intelligent Edge of Smart City

Understand applications and how to secure As a Service Smart City applications

Discuss: How Smart is the Edge

Security is in the IoT processor. This discussion will show the true edge.

Keynote by Schneider Electric - Transforming Industry with Digital Services: A Collaborative Industrial IoT Approach

Schneider Electric is number 1 in integrating complete critical infrastructure applications including the smart grid.

Discuss: Chips, Sensors, and Modules

Want to look deep into IoT security at the chip, sensor and module level.

Discuss: IIoT Security AI and ML beyond Identity

Interested in security practice beyond identity and auditing.

Register now for the IoT Evolution Expo and Get 20% off your full conference with code IoTTime and be there for all the information you need to drive your IoT strategy in 2020.   


Ken Briodagh is a storyteller, writer and editor with about two decades of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh

Editorial Director

SHARE THIS ARTICLE
Related Articles

RAN Research arm of Rethink Outlines 5G Market in New Report

By: Ken Briodagh    2/21/2020

A new report from the RAN Research arm of analyst firm Rethink Technology Research has taken a deep look at the landscape of 5G networking.

Read More

It's IoT Time: IoT Evolution 2020 is Over, But the Story Continues!

By: Ken Briodagh    2/19/2020

We are finally starting to dig through all the learning, connections and amazing experiences that came out of last week's IoT Evolution Expo and we wa…

Read More

IoT Evolution Announces IoT Evolution Expo 2020 Best in Show Award Winners

By: Ken Briodagh    2/19/2020

Leading Internet of Things event Honors Best of Show Award Winners in Fort Lauderdale, Florida

Read More

IoT Time Podcast S5 Ep7 IoT Evolution Expo Post Show Wrap-up

By: Ken Briodagh    2/19/2020

In this episode of IoT Time Podcast, Ken Briodagh is all alone again, this time to give you a very quick download on last week's IoT Evolution Expo 20…

Read More

Understanding 5G for IoT: Debunking Common Misconceptions

By: Special Guest    2/19/2020

Thinking of 5G is a minor evolution is a mistake, especially for business leaders, for whom 5G will be of strategic importance. Why? Let's debunk a co…

Read More