BEGINS IN: 0 days    0 Hours    0 Minutes     0 Seconds   
Wednesday, February 15 Thursday, February 16
Exhibit Hall Hours 3:00pm - 7:00pm 11:00am - 5:00pm

Days


Tracks

Tuesday, February 14, 2023
11:00am
Tuesday - 2/14/23
Industrial IoT Solutions (Room 209A/B)
Industrial IoT Security Vulnerablities
IIOT-01
Cyber-criminals and Cyber-terrorists are looking at IoT devices and their installations as an opportunity to steal information, extort money and attack national critical infrastructure. One of the most simple but efficient attacks is the Denial of Service attack, is a simple way to take out and extort cloud-based services. There is also targeted ransomware, common malware, DNS hijacking, and other tools these criminals and terrorists use. There is one common trait between these attacks, and that is that they in one way or another exploit centralized infrastructure solutions, be it at index, data, service, or user level. These active risks are not done by some lone “hacker” in a basement, we are talking about sophisticated and well-funded organizations with highly educated staff. To believe that cyber-security in its current form of attacker/defender is going to work when any takeout of data flow or service will be directly and immensely disruptive to our economy, security and lives are to not take these risks seriously.
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
11:45am
Tuesday - 2/14/23
Industrial IoT Solutions (Room 209A/B)
Top 3 Scalability Bottlenecks in IIoT Solutions Today
IIOT-02
The saying Time is Money and for Industrial IoT is all about production. Unfortunately IIOT is often a retrofit on to legacy systems. This can mean the systems are not communicating well enough to provide predictive and prescriptive information. This is only one example of the considerations that have to be considered to make an IoT solution scalable and efficient.
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
1:30pm
Tuesday - 2/14/23
Industrial IoT Solutions (Room 209A/B)
TBA
IIOT-03
Chief Product Officer Radix IoT Chief Product Officer Radix IoT
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
2:45pm
Tuesday - 2/14/23
Industrial IoT Solutions (Room 209A/B)
Industrial IoT: It's a Process
IIOT-04
Industry 4.0 refers to the use of interconnectivity, machine learning / AI, and real time data impacting automation of processes and processing. The session looks at what is revolutionary and shows significant impact on business operations.
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
Wednesday, February 15, 2023
1:00pm
Wednesday - 2/15/23
Industrial IoT Solutions (Room 209A/B)
Remote Temperature Monitoring
IIOT-05
CEO - Founding Partner SADELABS
Temperature is a very important parameter in the preservation of perishable goods like vegetables, fruits, meat, milk, fish, frozen products and sensitive products such as vaccines and medicines. Changes in temperature cause deterioration of the products. For this reason, the cold chain integrity must not be broken at all stages from production to consumption, so that the freshness of the products has not deteriorated. In cold chain applications, it is of great importance to measure the temperature frequently and continuously from the first adjustment. Although warehouses are known to routinely have broken refrigerators or underperforming equipment, manufacturers do not regularly check the temperature 24/7, and it becomes more difficult to control the process during transportation. It should also be emphasized that timing is critical in cold chain transportation. The Internet of Things (IoT) is developing rapidly with the principle of connection from everywhere, with everyone, with everything, at every time. As a result of this fact, cold chain transportation has gained a remote temperature monitoring system in recent years. Both carriers and manufacturers can now track the vehicles and make remote guidance, especially in the solution of temperature-related problems.
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
1:30pm
Wednesday - 2/15/23
Industrial IoT Solutions (Room 209A/B)
Using Private Cellular Networks for Successful IoT Deployments
IIOT-06
Private networks and IoT will continue to be closely tied and the importance of this relationship will only continue to grow as the number of private networks increases and IoT connectivity on a global scale expands. This session will cover: • Understanding the necessary elements needed to establish a private network • Understanding the private wireless ecosystem; the key players and their critical roles • Use Case walkthrough: End-to-end network view for IoT services • Extending secure connectivity between private and macro cellular networks and alternate enterprise locations
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
2:00pm
Wednesday - 2/15/23
Industrial IoT Solutions (Room 209A/B)
Is IT/OT Convergence Ending and a New IT/OT-Separation Forming?
IIOT-07
IoT is the core platform bringing modern IT technology – computer networks, servers, cloud, AI, databases etc. - into the industrial operational world, commonly described as Operational Technology (OT). One scenario is simply expanding the existing IT network to IoT devices on the OT side. There are many advantages of such an approach: IoT production statistics, for example, can be transferred directly into ERP systems and IoT devices can be automatically controlled according to business demands or even remotely controlled over the internet. But security issues foreshadow this open IT/OT-relationship: As the Colonial Pipeline ransomware attack showed, if any malware exists on the IT site, it will move quickly across the network to the OT side, affecting devices there and stopping the entire operational process. Which approach is selected – from an open IT/OT-relationship to a totally physical separation of two computer networks at IT and OT - depends on the specific industrial system, its purposes, and its risk of failure. This presentation shows several approaches with examples of how a flexible, efficient, but also secure IT/OT network separation can look and discusses methods to establish minimal OT-impact in case of an IT-malware-disaster.
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
2:30pm
Wednesday - 2/15/23
Industrial IoT Solutions (Room 209A/B)
Trust No One: Trust No Thing
IIOT-08
Worldwide IoT security spending totaled $3.1 million in 2021, yet IoT attacks are still rising. A 2021 study by Microsoft revealed that 44% of respondents experienced an IoT attack in the past two years, and half said that IoT attack volumes had increased in the same amount of time. The average cost of cyber breach rose 2.6% to $4.35 million in 2022, signifying the accelerating financial impact of cyber-attacks on business operations. As businesses move to connect their IT/OT/IoT platforms to support digital transformation, remote work and emerging applications, attack surfaces and network complexity have spiraled out of control, and they are suffering the consequences. The common reaction among IoT operators is to add layer upon layer of security products and vendors to their stack, but this only negatively impacts the security, performance and manageability of their security stack. With IoT attacks rising and their financial impact only accelerating, it is evident that IoT operators must simplify their security stack to protect their software-defined IoT. This will allow them to secure a healthy return on investment with a Results-Oriented IoT security strategy that meets their business goals. Network complexity has outpaced legacy methods of perimeter-based network security because there is no single enterprise perimeter in today’s highly distributed business world, especially among complex IoT platforms. Many security products on the market fail to secure IoT platforms because they do not address the underlying causes of rising cyber-attacks, and they only complicate the security stack. Though they mark the progress of security to the cloud and may improve manageability, even secure access service edge (SASE) products suffer from performance and security challenges when used to secure IoT platforms. Security, performance and manageability are essential factors to stop rising cyber-attacks, and IoT operators must select and deploy solutions that simplify their security stack and enhance these factors through a single integrated platform that features peer-to-peer architecture instead of cloud-based architecture. The answer to these problems is Zero-Trust Network Access (ZTNA). Zero-Trust assumes there is always a malicious actor in the network and that an enterprise network is just as vulnerable as a public network. ZTNA solutions create a software-defined perimeter (SDP) around IoT assets, making them invisible to unauthenticated users in any physical location and simplifying the security stack without sacrificing performance.
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
Thursday, February 16, 2023
10:00am
Thursday - 2/16/23
Industrial IoT Solutions (Room 209A/B)
Wi-Fi HaLow – IoT Connectivity Without Compromise
IIOT-09
802.11ah Wi-Fi HaLow is a wireless standard developed for IoT networks. Wi-Fi HaLow offers long-range, high speeds, low energy, signal penetration, and high client counts. Other wireless connectivity standards have limitations. LoRaWAN has low data rates, BLE and ZigBee have short-range and lots of wireless contention, and Wi-Fi has high energy requirements. Wi-Fi HaLow breaks free from all these drawbacks and checks all the boxes an IoT network could want. So if LoRaWan was too slow, BLE too short range or Wi-Fi runs through batteries too quickly for your last IoT deployment, learn how HaLow early adopters put the technology to use. The first chipsets were certified by the Wi-Fi Alliance in November of 2021. Let us walk you through Wi-Fi HaLow’s early adoption story and how the Wi-Fi standard is being used in the marketplace today. Learn why device manufacturing companies decided to implement HaLow and why it might be the best choice for your next generation of IoT deployment. Learn More about: • What Wi-Fi HaLow is capable of in real-world environments • How it compares to competing connectivity standards • Where Wi-Fi HaLow is used today • The potential of Wi-Fi HaLow as a connectivity standard for the IoT devices proposed session title: Wi-Fi HaLow – IoT Connectivity Without Compromise
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions
10:30am
Thursday - 2/16/23
Industrial IoT Solutions (Room 209A/B)
Private Network strategies
IIOT-10
When it comes to private networks there is no shortage of architectures and methodologies. However there is a shortage of explanations as to the when the what and the why. Here we try to clear the air of noise and give some clears signals as to what can be done.
Register me
  5G/6G Solutions
  Industrial IoT Solutions
  Smart City Solutions

 

PLATINUM SPONSOR

MEDIA SPONSOR