Video Chats

Cyber Beat Live: Tap into the growth of the Internet of Things without

Post Comment
June 1, 2016 | 56:49

Overview

Gartner forecasts that 20.8 billion connected things will be in use worldwide by 2020. The issue however is not how quickly the internet of things is growing but the risks it brings. In the same report Gartner predicts that the IoT will account for more than 25% of identified attacks. How can we maximize the possibilities that the IoT gives us while minimizing the risks? Watch as leading experts discussed the following questions including how we  counter and mitigate cybersecurity breaches in our connected world.

  • Why is the security for IoT devices often so weak?
  • How are hackers exploiting IoT devices?
  • What can organizations do to secure their connected devices? What should vendors be doing?
  • Who is responsible for securing the smart home?
  • Can our connected homes, cars and devices “attack” us?
  • What role does government play in securing connected devices?

Fortify IoT devices from cyber attacks

Join us at i2Summit to learn how your organization can outthink threat.

Host

Andrew Borene is senior executive for worldwide strategy for the IBM i2 Safer portfolio. He is a licensed attorney and national security analyst and draws on more than 15 years of professional experience in business, law and government. As a former US Marine officer, Andrew also has special expertise in the national security enterprise, information sharing, knowledge workflows, government relations, government contracts, capital markets and the building of world-leading strategic relationships between public, private and academic partners.

Guests

Scott N. Schober is a cybersecurity expert and president and CEO of Berkeley Varitronics Systems, Inc., a 40-year-old provider of advanced wireless radio frequency (RF) test and security solutions. Schober has overseen the development of numerous cell phone detection tools used to enforce “no cell phones” policies in corporate, correctional, law enforcement, military, secured government and university facilities. He regularly appears on Arise TV, Bloomberg TV, Canadian TV News and as a cybersecurity expert with numerous appearances on Al Jazeera America, CCTV America, CNBC, CNN, Fox Business Channel, Fox News, Inside Edition, MSNBC, One America News (OAN), PIX11, TheBlaze and more. Schober has also presented as a subject-matter expert (SME) discussing cybersecurity and corporate espionage at numerous conferences worldwide.

Dan Lohrmann is an internationally recognized cybersecurity leader, technologist, speaker, blogger and author who led Michigan’s cybersecurity and technology infrastructure teams from 2002 to 2014. He has received a wide range of national awards, including CSO of the Year, Public Official of the Year and Computerworld Premier 100 Leader. Dan is a sought-after and trusted source of government cybersecurity counsel at a national level and draws on extensive experience advising senior leaders at the White House and in the National Governor’s Association (NGA); the National Association of State CIOs (NASCIO); the U.S. Department of Homeland Security (DHS); federal, state and local government agencies; Fortune 500 companies; small businesses and nonprofit institutions.

Richard Stiennon is a veteran of the security industry and draws on years of experience as an industry analyst spent advising enterprises, vendors and government agencies on their security strategies. He is the author of Surviving Cyberwar (Government Institutes, 2010), UP and to the RIGHT: Strategy and Tactics of Analyst Influence (IT-Harvest Press, 2012) and There Will Be Cyberwar: How the Move to NCW Has Set the Stage for Cyberwar (IT-Harvest Press, 2015).