Early this December around 400 stakeholders in the public and private sector smart city ecosystems came together in Boston to explore using IoT to improve operations in urban areas.
Diamond sponsor Verizon showed off technology from its Sensity buy, and CIOs from Chicago, Seattle and Atlanta discussed opportunities and challenges, including the need to come up with innovative funding models, safeguard data and navigate an uncertain standards landscape.
In fact Brenna Berman, commissioner and CIO at the city of Chicago's department of innovation and technology, called out vendors from the keynote stage, asking them to solidify around IoT technology standards. Berman said the city is open to buying gear from multiple suppliers -- but not if that means spending time and money struggling to integrate disparate systems.
The global IT, BPM and consulting company Wipro has announced that it has joined the Industrial Internet Consortium, the "global, member-supported organization that promotes the accelerated growth of the industrial internet of things (IIoT)".
The internet of things market is growing exponentially, in value as well as size, and the value of the smart building market is growing in tandem. How can companies on the buy and sell sides take advantage?
Identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things deployment.
Realizing your company's IoT vision starts with connecting and securing your infrastructure. IoT infrastructures require organizations to collect and transmit commands and data from devices, applications and people -- securing all of this is a sizeable challenge.
Our expert panelists will identify and solve the key issues that arise during this process, enabling a safe and steady beginning to your organization's IoT journey.
The webinar will cover:
Identity Issuance: Security at Scale
Identity Management: Authentication and Authorization
Identity and Data Security: Data Integrity and Granular Policy Definition
Webinar attendees will learn:
How to ensure that data is only accessed by authorized devices, applications and users in an IoT setting
Methods for transmitting data from devices in the field to value engines securely and efficiently
Best practice for implementing tried-and-trusted IoT ecosystems and safeguarding data flow across your company's entire infrastructure
How to create a holistic and protected IoT ecosystem for your company