Securing Your IoT Implementations – Similar, but Not the Same
Date: January 5, 2017
Time: 2:00 PM ET | 11:00 AM PT
As the Internet of Things is deployed across a wide range of industrial, consumer, and business environments, of special interest and concern is the need to implement IoT solutions with careful attention to security. While many of the challenges in IoT security are similar to the challenges of securing information technology (IT) computing environments, there are special considerations due to the scale, operating conditions, system capabilities, and wide range of device types which are used in IoT solutions. Further, these systems, by connecting the electronic and physical worlds, must address both operations technology (OT) security and information technology (IT) security.
In this session we will discuss the existing and emerging capabilities from IBM which we are both building into our IoT platform as well as the solutions built on top of that platform. Security features address the full spectrum of designing, building, deploying, and operating IoT solutions and are being built to enable a risk-based approach to applying these security capabilities. Both well-established and new technologies such as blockchain-based collaboration are part of these security capabilities. We consider device, network, application, and user security, with consideration for confidentiality, integrity, and availability of the systems and information. Considerations for safety and privacy also factor into the capabilities which IBM is building to secure IoT environments.
Tim Hahn is an IBM Distinguished Engineer and has been with IBM since 1990. He is the Chief Architect for Internet of Things Security within the IBM Watson Internet of Things division. He is responsible for strategy, architecture, and design for IBM Watson Internet of Things offerings. These offerings, coupled with others from across IBM, enable customers to design, build, experiment, run, manage, and operate solutions involving diverse sensor data coming from connected devices. These solutions leverage IBM's strengths in cloud, cognitive, analytics, mobile, social, and security.