Welcome!

Linux Authors: Dana Gardner, Pat Romanski, Elizabeth White, Carmen Gonzalez, Brian Vandegrift

Related Topics: IoT Expo, Java, Linux, Virtualization, Cloud Expo, Big Data Journal

IoT Expo: Article

Big Data's Potential in Helping to Secure the Internet of Things

At @ThingsExpo, IBM’s James Kobielus to discuss how IT professionals should approach addressing the security challenges of IoT

Big Data's Potential in Helping to Secure the Internet of Things

The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons.

In the IoT vision, every new "thing" - sensor, actuator, data source, data consumer, routing intermediary, etc., - is a new security-relevant detail that stirs up a wide range of collateral security issues. In other words, every new networked IoT endpoint is a new potential attack vector or launching point that the baddies can exploit. Potentially, every time you plug in a new IoT-networked device that is infected with malware or simply open to unauthorized third-party exploitation, the vulnerabilities start. Someone somewhere might exploit the new access point to gain illicit access to sensitive secrets (business, consumer, government, etc.), to damage software and data, and to wage distributed denial of service attacks.

In his session at Internet of @ThingsExpo, James Kobielus, IBM Big Data Evangelist, will:

  • Discuss how IT professionals should approach addressing the security challenges of IoT
  • Describe IoT vulnerabilities at the device, application, and network level
  • Present a multi-layered IoT-security vision that includes incorporation of robust security protections into IoT products plus more global approaches that rely on consolidated big-data-powered security incident and event management

Key session points:

  • Comprehensive IoT security is multilayered: device and application endpoints, middleware and infrastructures, vendor ecosystems.
  • Fortunately, the IoT industry and security professionals are beginning to address these challenges on many fronts.
  • As new IoT technologies take hold and new threats reveal themselves, the global security framework will grow more complex.
  • Ongoing refinement of IoT security standards, practices, and tools will go on indefinitely.

Explore Internet of @ThingsExpo Sponsorship & Exhibit Opportunities !

Speaker Bio:
James Kobielus is an industry veteran and serves as IBM's Big Data evangelist, as program director for Big Data analytics product marketing, and as editor-in-chief of IBM Data Magazine. He spearheads IBM's thought leadership activities in Big Data, Hadoop, enterprise data warehousing, advanced analytics, and cognitive computing. He advises IBM's product management and marketing teams on big data analytics. He has spoken at such leading industry events as Hadoop Summit, Strata, and Forrester Business Process Forum. He has published several business technology books and is a very popular provider of original commentary on blogs and many social media.

A Rock Star Faculty, Top Keynotes, Sessions, and Top Delegates!
Internet of @ThingsExpo 2014 Silicon Valley, November 4-6, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading IoT industry players in the world.

The growth and success of Internet of Things will be on display at the upcoming Internet of @ThingsExpo conference and exhibition in Santa Clara, CA, November 4-6, 2014.

All main layers of the IoT ecosystem will be represented at the Internet of @ThingsExpo - the infrastructure players, the platform providers, and those offering applications, and they'll all be here to speak, sponsor, exhibit and network.

Sponsorship Opportunities
for
Internet of @ThingsExpo 2014 Silicon Valley
Internet of @ThingsExpo 2014 Silicon Valley "show prospectus" has shipped. Sponsorship, exhibit, and keynote opportunities can be obtained from Carmen Gonzalez by email at events (at) sys-con.com, or by phone 201 802-3021.

Early Bird Registration Options
for
Internet of @ThingsExpo 2014 Silicon Valley
Internet of @ThingsExpo delegates can pre-register for Internet of @ThingsExpo with Early Bird Savings here.

About SYS-CON Media & Events
SYS-CON Media (www.sys-con.com) has since 1994 been connecting technology companies and customers through a comprehensive content stream at www.sys-con.com - featuring over forty focused subject areas, from Cloud Computing to Web Security - interwoven with market-leading full-scale conferences produced by SYS-CON Events. The company's internationally recognized brands include among others Cloud Expo® (www.CloudComputingExpo.com), Big Data Expo (http://BigDataExpo.net), Virtualization Conference & Expo (www.VirtualizationConference.com), DevOps Summit (http://DevOpsSummit.sys-con.com), Internet of @ThingsExpo (http://www.ThingsExpo.com), SDDC Expo (http://SDDCExpo.sys-con.com), WebRTC Summit (http://WebRTCSummit.net), Government IT Conference & Expo (www.GovITExpo.com), Cloud Computing Bootcamp (www.CloudComputingBootcamp.com), and UlitzerLive! New Media Conference & Expo (http://events.sys-con.com).

Cloud Expo® is a registered trademark of Cloud Expo, Inc.

More Stories By Elizabeth White

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.