-
Video
-
Audio
-
Table of contents
-
Video
-
Audio

- Description
- Transcript
- Discussion
About speaker
Stuart Mitchell is the Chief Evangelist and Head of Product at ZARIOT and is driven by a desire to safely connect the world’s devices. Having held a senior management position at VeriSign, Stuart moved into strategic roles in mobile telecom service providers and, just before joining the ZARIOT team, bootstrapped and successfully exited an internal IoT startup venture. A strong advocate of customer-first, Lean startup methodology, Stuart brings an entrepreneurial and characteristically lateral approach to every project he undertakes.
View the profileAbout the talk
More than ever we need the Internet of Things to drive reliable and secure automated means of production, monitoring and control when facing up to the challenges of environmental concerns and a global pandemic. Ensuring supply chains can scale to adapt to massive peaks of demand while production can be made more efficient and create less waste is good for the health of our economy and planet while ensuring the air we breathe and the water we drink is clean and the driver-less cars are safe are vital for the safety of our population.
Cellular IoT is the best way to connect remote sensors and moving assets, however there are still major security vulnerabilities in that ecosystem which might allow ‘bad actors’ to snoop, intercept or even disable connectivity entirely. What can we learn from the developments in enterprise IT security to ensure we only provide fit-for-purpose connectivity for the Internet of Things of the future?
ZARIOT from its inception has been laser-focused on security and is working to become the world’s first Zero Trust cellular connectivity solution. Looking at the “6 Ws” (Who, What, When, Where, Why and How) of connecting devices to a mobile network we will examine how existing techniques can be used to ensure SIMs can be fully protected from compromise. What techniques can be used to protect SIMs deployed in remote environments to ensure compromise of physical security doesn’t lead to fraud and excessive charges? What vulnerabilities are inherent on the mobile network infrastructure itself, what are the risks and how can they be mitigated? And how and when should the public Internet be used carry critical and sensitive data for analysis and storage?
This session will take the form of an interactive presentation, targeting stakeholders of the IoT community who have not yet fully considered IoT security from the perspective of connectivity. This includes device manufacturers, solutions providers, systems integrators, and security consultants. The intended outcome is that the audience understand that cellular connectivity is itself an attack vector which must be protected, and additional security capability can be added to both SIMs and the network layer, thereby reducing barriers to IoT adoption in projects where security is paramount. This level of security may be a turning point for adoption into projects such as voting machines and mission-critical devices such as autonomous vehicles and drones.
Share
Hi everybody. My name is Jeff Mitchell. I'm the chief evangelist and head of product designer yet. Aisi security is evolving. I don't think I have cheese be left behind by wants to die about what we can learn in the IT industry from the world coprite e and how we can best help for textile Solutions. This is how we used to work. Lots of roses Basques people sitting behind computers, but we simply don't look like that anymore today. We have medical devices do to people take a bunch of working on presenting Q from home
today and because of the global pandemic, it just means that normal paper being driven a sword. This is what we called in office. Whether it's a coffee shop or a home, maybe even the bench by the beach. This is why people work. The traditional approach to security doesn't work anymore either everyone within the office and work and connect to each other safely face in the Northeast security. But this is how we need to think about security now. Let me think about various fsw has whether it's money or
homes, or do you have to be ready hold? We think about Security in different ways the solution to buy individual asset weather for the potluck and shine or we just need to keep an eye on things using CCTV. Because we need to think about this because today is not is not just while sitting behind a computer. Internet is the internet of things which is what we
Buy this talk
Access to all the recordings of the event
Interested in topic “IoT”?
You might be interested in videos from this event
Similar talks
Buy this video
Video
Conference Cast
With ConferenceCast.tv, you get access to our library of the world's best conference talks.
