top of page
KEYNOTE SESSION HIGHLIGHT

Keynote 11 :

Secure IoT - let the T stand for Trust in IoT​

The advent of IoT is expected to connect billions of digital endpoints driving the Digital Transformation benefits of product optimization, usage-based business models, remote maintenance, and so on. In order to achieve this vision all manufacturers of connected devices have to meet four distinct challenges: ensure the secure production of the device, establish and manage the unique device identities, enable the secure communication from and to the IoT device and manage the respective industry-specific or regulatory compliance requirements. Therefore, Trust needs to be established in the IoT ecosystem starting with the Supply chain through the secure authentication of suppliers and components (HW / SW), securing the Production infrastructure against cyber-physical attacks, Identity and Access Management for endpoints, data, people and assuring Data privacy and confidentiality on the uplink and the downlink from and to the IoT device.

Utimaco-DavidCheng_Photo_Wix.png

David Cheng

Regional Sales Director of GCKM

(Greater China, S. Korea and Mongolia)

Utimaco

P - Exclusive_networks (Utimaco) .png

Supported by 

Summit Highlights

© 2022 Market Intelligence Group Limited All rights reserved

bottom of page