KEYNOTE SESSION HIGHLIGHT
Keynote 11 :
Secure IoT - let the T stand for Trust in IoT​
The advent of IoT is expected to connect billions of digital endpoints driving the Digital Transformation benefits of product optimization, usage-based business models, remote maintenance, and so on. In order to achieve this vision all manufacturers of connected devices have to meet four distinct challenges: ensure the secure production of the device, establish and manage the unique device identities, enable the secure communication from and to the IoT device and manage the respective industry-specific or regulatory compliance requirements. Therefore, Trust needs to be established in the IoT ecosystem starting with the Supply chain through the secure authentication of suppliers and components (HW / SW), securing the Production infrastructure against cyber-physical attacks, Identity and Access Management for endpoints, data, people and assuring Data privacy and confidentiality on the uplink and the downlink from and to the IoT device.
Supported by