Logo
Click here if you have not previously registered.
 If you have previously registered for this event, please login below:
 Email
 LOGIN

By clicking below, I acknowledge and agree to Penton’s Terms of Service and to Penton’s use of my contact information to communicate with me about offerings by Penton, its brands, affiliates and/or third-party partners, consistent with Penton’s Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the webinar so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them.


You must have Javascript and Cookies enabled to access this webcast. Click here for Help.

Securing Your IoT Implementations – Similar, but Not the Same

Date: January 5, 2017
Time: 2:00 PM ET | 11:00 AM PT

As the Internet of Things is deployed across a wide range of industrial, consumer, and business environments, of special interest and concern is the need to implement IoT solutions with careful attention to security. While many of the challenges in IoT security are similar to the challenges of securing information technology (IT) computing environments, there are special considerations due to the scale, operating conditions, system capabilities, and wide range of device types which are used in IoT solutions. Further, these systems, by connecting the electronic and physical worlds, must address both operations technology (OT) security and information technology (IT) security.

In this session we will discuss the existing and emerging capabilities from IBM which we are both building into our IoT platform as well as the solutions built on top of that platform. Security features address the full spectrum of designing, building, deploying, and operating IoT solutions and are being built to enable a risk-based approach to applying these security capabilities. Both well-established and new technologies such as blockchain-based collaboration are part of these security capabilities. We consider device, network, application, and user security, with consideration for confidentiality, integrity, and availability of the systems and information. Considerations for safety and privacy also factor into the capabilities which IBM is building to secure IoT environments.

Webcast Presenter:



Tim Hahn
Tim Hahn is an IBM Distinguished Engineer and has been with IBM since 1990. He is the Chief Architect for Internet of Things Security within the IBM Watson Internet of Things division. He is responsible for strategy, architecture, and design for IBM Watson Internet of Things offerings. These offerings, coupled with others from across IBM, enable customers to design, build, experiment, run, manage, and operate solutions involving diverse sensor data coming from connected devices. These solutions leverage IBM's strengths in cloud, cognitive, analytics, mobile, social, and security.