Video Chat

This video chat is brought to you by IBM Analytics using Blab, a new video chat interface in beta allowing users the opportunity to ask questions and watch live as experts discuss insider security threats.
Please note: In order to engage in the chat, you will be required to sign in to Blab using your Twitter account. A pop up in the window above will prompt your sign in when you enter text into the chat window. After you sign in, please be sure to refresh this page so that you can engage via chat.

If you choose not to sign in, you can still watch the video chat uninterrupted, but will not have chat abilities. Please be patient and have fun as we test out this new video chat platform and learn from the experts.

By 2020, Gartner reports, “more than 25 percent of identified attacks in enterprises will involve IoT, although IoT will account for less than 10 percent of IT security budgets.” Amid daily growing numbers of connected devices—wearables, televisions, refrigerators, automobiles—that promise efficiency and better decision making, many researchers are warning about the security risks posed by the Internet of Things (IoT) in our connected world.

How do we balance the promise and the risk of the Internet of Things? Tune in to this edition of Cyber Beat Live to hear leading experts discuss how you can address the challenges of a connected world by countering and mitigating cybersecurity breaches

  • Why is the security for IoT devices often so weak?
  • How are hackers exploiting IoT devices?
  • What can organizations do to secure their connected devices? What should vendors be doing?
  • Who is responsible for securing the smart home?
  • Can our connected homes, cars and devices “attack” us?
  • What role does government play in securing connected devices?

Here are a few resources to help you prepare for the conversation:

Join us for this live event as we discuss how to fortify IoT devices against cybersecurity risks.

Time: 11:00 am ET

Date: 5/24/2015


Andrew Borene is senior executive for worldwide strategy for the IBM i2 Safer portfolio. He is a licensed attorney and national security analyst and draws on more than 15 years of professional experience in business, law and government. As a former US Marine officer, Andrew also has special expertise in the national security enterprise, information sharing, knowledge workflows, government relations, government contracts, capital markets and the building of world-leading strategic relationships between public, private and academic partners.


Scott N. Schober is a cybersecurity expert and president and CEO of Berkeley Varitronics Systems, Inc., a 40-year-old provider of advanced wireless radio frequency (RF) test and security solutions. Schober has overseen the development of numerous cell phone detection tools used to enforce “no cell phones” policies in corporate, correctional, law enforcement, military, secured government and university facilities. He regularly appears on Arise TV, Bloomberg TV, Canadian TV News and as a cybersecurity expert with numerous appearances on Al Jazeera America, CCTV America, CNBC, CNN, Fox Business Channel, Fox News, Inside Edition, MSNBC, One America News (OAN), PIX11, TheBlaze and more. Schober has also presented as a subject-matter expert (SME) discussing cybersecurity and corporate espionage at numerous conferences worldwide.

Dan Lohrmann is an internationally recognized cybersecurity leader, technologist, speaker, blogger and author who led Michigan’s cybersecurity and technology infrastructure teams from 2002 to 2014. He has received a wide range of national awards, including CSO of the Year, Public Official of the Year and Computerworld Premier 100 Leader. Dan is a sought-after and trusted source of government cybersecurity counsel at a national level and draws on extensive experience advising senior leaders at the White House and in the National Governor’s Association (NGA); the National Association of State CIOs (NASCIO); the U.S. Department of Homeland Security (DHS); federal, state and local government agencies; Fortune 500 companies; small businesses and nonprofit institutions.

Richard Stiennon is a veteran of the security industry and draws on years of experience as an industry analyst spent advising enterprises, vendors and government agencies on their security strategies. He is the author of Surviving Cyberwar (Government Institutes, 2010), UP and to the RIGHT: Strategy and Tactics of Analyst Influence (IT-Harvest Press, 2012) and There Will Be Cyberwar: How the Move to NCW Has Set the Stage for Cyberwar (IT-Harvest Press, 2015).