SlideShare a Scribd company logo
IoT Panel Discussion, Part II:
Security for Silicon, Software, and Sensors
Moderator:
Curt Schwaderer
Technology Trends Specialist
OpenSystems Media
Speakers:
Tu Le, Sr. Product Manager, Flexera Software
James Kirkland, Chief Architect, IoT & Intelligent Systems, Red Hat
Stan Schneider, Ph.D., CEO, RTI
Dave Hart, Chief Technology Officer, ThingWorx
Agenda
 Housekeeping
 Panel Discussion
 Questions and Answers
 Wrap-up
Tu Le, Senior Product Manager,
Flexera Software
Tu Le is a senior product manager for Flexera software. Tu is
responsible for the FlexNet Licensing technology (FlexNet
Publisher and FlexNet Embedded). Tu has over 14 years of
security experience in Cryptography, Anti-piracy and Software
Licensing and Entitlement Management.
James Kirkland, Chief Architect, IoT &
Intelligent Systems, Red Hat
James Kirkland is Chief Architect for the Internet of Things and
Intelligent Systems at Red Hat. He has been working with Unix
and Linux variants for 20 years. He has been working with on IoT
solutions in the transportation and energy sectors for the last five
years. He is a frequent public speaker and writer on a wide range
of technical topics. He is the co-author of Linux(R)
Troubleshooting for System Administrators and Power Users
(ISBN: 0131855158) published by PrenticeHall PTR.)
Picture goes here
Stan Schneider, Ph.D., CEO,
RTI
Stan Schneider is CEO at Real-Time Innovations (RTI), the Industrial
Internet of Things connectivity platform company. RTI is the largest
embedded middleware vendor and has an extensive footprint in all
areas of the Industrial Internet, including Energy, Medical, Automotive,
Transportation, Defense, and Industrial Control.
Stan is also a member of the Industrial Internet Consortium Steering
Committee.
Stan completed his PhD in Electrical Engineering and Computer
Science at Stanford University, and holds a BS and MS from the
University of Michigan. He is a graduate of Stanford's Advanced
Management College.
Dave Hart, Chief Technology Officer,
ThingWorx
Dave is the CTO of the ThingWorx IoT segment at PTC, where he is
directly responsible for the ThingWorx engineering teams continued
delivery of innovative IoT platform capabilities. Dave is an expert in
the IoT space, leading successive generations of remote connectivity
platforms and solutions, playing key roles in designing, evangelizing,
and realizing innovative connected product solutions.
Dave joined PTC as part of the Axeda acquisition, where as CTO he
drove Axeda¹s technology and product development teams. Prior to
Axeda Dave provided technical leadership and direction for Questra¹s
Intelligent Device Management platform from product inception
through the ultimate acquisition by Axeda. In addition to product
development, Dave has developed and led solution architecture,
product management, and professional services organizations in
ensuring the successful deployment of connected products in the
marketplace.
Security Applications & Architecture
IoT applications range from consumer to industrial.
In many cases, the lines are blurring and consumer devices
are finding their way into connecting/communications with
critical systems.
 What are distinguishing characteristics of Industrial versus
consumer IoT applications?
 What are the architectural components?
 What are the security concerns?
Security Architecture
Many embedded and enterprise systems implement a security
architecture. IoT is no different, but has unique security
concerns.
 What kinds of bad things can happen in IoT applications?
 What considerations go into the security architecture?
 Are there important components to address?
– Authentication? Corruption? Spoofing? Back-doors that can allow
hackers to control the system? Attempts to steal SW or intellectual
property within the IoT system?
Security Considerations for Silicon, SW,
Sensors
 Sensor Security: How to verify access to sensor information
and prevent spoofing of sensor data to the collection?
 Silicon & SW Security: Capabilities built into the silicon
and/or software to prevent hacking, back doors, SW
corruption, enabling/disabling features, etc.
 Cloud services: How to protect the data in the cloud? How to
authenticate and secure sensor & SW information coming
into and going out of the cloud for the application?
Audience Q & A
Tu Le, Flexera Software
James Kirkland, Red Hat
Stan Schneider, RTI
Dave Hart, ThingWorx
Sponsor Resources
Flexera Software: How Can You Monetize the Internet of Things? 5 Tips to Get Started
http://media.flexerasoftware.com/documents/eBook-SWM-Monetize-IoT.pdf
Red Hat: An Intelligent Systems Solution for the Internet of Things
http://www.redhat.com/en/files/resources/en-rh-intelligent-systems-solution-internet-of-things.pdf
RTI: Is Your Data Secure?
http://www.rti.com/whitepapers/Is_Your_Data_Secure.pdf
ThingWorx Security Whitepaper: Providing Secure Connected Products
http://bit.ly/1LaSXO8
Thanks for joining us
Event archive available at:
http://ecast.opensystemsmedia.com/
E-mail us at: jgilmore@opensystemsmedia.com

More Related Content

PPTX
Why is DDS the Right Technology for the Industrial Internet?
PPTX
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
PPTX
Four keys to securing distributed control systems and the industrial (IoT)
PDF
Standards for Autonomous and Secure Microgrids
PDF
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
PPTX
Data Distribution Service Security and the Industrial Internet of Things
PDF
The Industrial Internet of Things and RTI
PPTX
Embedded Security and the IoT – Challenges, Trends and Solutions
Why is DDS the Right Technology for the Industrial Internet?
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
Four keys to securing distributed control systems and the industrial (IoT)
Standards for Autonomous and Secure Microgrids
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
Data Distribution Service Security and the Industrial Internet of Things
The Industrial Internet of Things and RTI
Embedded Security and the IoT – Challenges, Trends and Solutions

What's hot (20)

PPTX
Blueprint for the Industrial Internet: The Architecture
PPTX
Internet of Things (IoT) Costs, Connectivity, Resources and Software
PPTX
Interoperability and the Internet of Things – To standardize or not to standa...
PPTX
How to Architect Microgrids for the Industrial Internet of Things
PDF
DDS for Internet of Things (IoT)
PDF
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
PDF
The Platform for the Industrial Internet of Things (IIoT)
PPTX
Secrets of Autonomous Car Design
PDF
Industrial IOT Data Connectivity Standard
PDF
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
PPTX
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
PDF
Fog Computing is the Future of the Industrial Internet of Things
PDF
SN-Security Architecture for Mobile Computing and IoT
PDF
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
PDF
Architectural Patterns in IoT Cloud Platforms
PPTX
IoT and M2M Safety and Security
PPTX
Advancing Active Safety for Next-Gen Automotive
PDF
Introduction to Operational Technology 0.1
PDF
IoT architecture
PDF
Secure IOT Gateway
Blueprint for the Industrial Internet: The Architecture
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Interoperability and the Internet of Things – To standardize or not to standa...
How to Architect Microgrids for the Industrial Internet of Things
DDS for Internet of Things (IoT)
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Platform for the Industrial Internet of Things (IIoT)
Secrets of Autonomous Car Design
Industrial IOT Data Connectivity Standard
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Fog Computing is the Future of the Industrial Internet of Things
SN-Security Architecture for Mobile Computing and IoT
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Architectural Patterns in IoT Cloud Platforms
IoT and M2M Safety and Security
Advancing Active Safety for Next-Gen Automotive
Introduction to Operational Technology 0.1
IoT architecture
Secure IOT Gateway
Ad

Similar to IoT Panel, Part II: Security for Silicon, Software, and Sensors (20)

PDF
Charleston R!OT IoT Applications for Defense Workshop
PPTX
_Creating Smart and Secure IoT Devices_ A Step-by-Step Guide (1).pptx
PDF
Top 30 Internet Of Things (IoT) Companies In The USA.pdf
PPTX
Internet & iot security
PDF
assignment help experts
PDF
sample assignment
PDF
An Internet of Things Reference Architecture
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PDF
Software security, secure software development in the age of IoT, smart thing...
PDF
Cybersecurity In IoT Challenges And Effective Strategies.pdf
PDF
Understanding and Solving Common IoT Security Problems.pdf
PDF
How Secure are you Around “IoT”_.pdf
PPTX
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
PDF
Security and Privacy Big Challenges in Internet of things
PPTX
A_Review_on_Security_Challenges_in_Internet_of.pptx
PDF
Security for the IoT - Report Summary
PPTX
IOT and Security.pptx
PPTX
IOT and Security.pptx
PDF
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
PDF
Telefónica security io_t_final
Charleston R!OT IoT Applications for Defense Workshop
_Creating Smart and Secure IoT Devices_ A Step-by-Step Guide (1).pptx
Top 30 Internet Of Things (IoT) Companies In The USA.pdf
Internet & iot security
assignment help experts
sample assignment
An Internet of Things Reference Architecture
IoT Security, Threats and Challenges By V.P.Prabhakaran
Software security, secure software development in the age of IoT, smart thing...
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Understanding and Solving Common IoT Security Problems.pdf
How Secure are you Around “IoT”_.pdf
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Security and Privacy Big Challenges in Internet of things
A_Review_on_Security_Challenges_in_Internet_of.pptx
Security for the IoT - Report Summary
IOT and Security.pptx
IOT and Security.pptx
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Telefónica security io_t_final
Ad

More from Real-Time Innovations (RTI) (20)

PPTX
A Tour of RTI Applications
PDF
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
PDF
ISO 26262 Approval of Automotive Software Components
PDF
The Low-Risk Path to Building Autonomous Car Architectures
PPTX
Introduction to RTI DDS
PDF
How to Design Distributed Robotic Control Systems
PPTX
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
PPTX
Cyber Security for the Connected Car
PPTX
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
PPTX
How the fusion of time sensitive networking, time-triggered ethernet and data...
PPTX
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
PPTX
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
PPTX
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
PDF
Tech Mahindra - Connected Engineering
PPTX
Generic Vehicle Architecture – DDS at the Core.
PPTX
Weather Information System Airport and Decision Support (WISADS)
PDF
System integration in offshore supply vessels – how we applied DDS and redefi...
PDF
Integrating DDS into AXCIOMA - The Component Approach
PDF
Distributed Communication and Control for a Network of Melting Probes in Extr...
PDF
MiroSurge: Research Platform for Robotic Surgery
A Tour of RTI Applications
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
ISO 26262 Approval of Automotive Software Components
The Low-Risk Path to Building Autonomous Car Architectures
Introduction to RTI DDS
How to Design Distributed Robotic Control Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
Cyber Security for the Connected Car
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
How the fusion of time sensitive networking, time-triggered ethernet and data...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Tech Mahindra - Connected Engineering
Generic Vehicle Architecture – DDS at the Core.
Weather Information System Airport and Decision Support (WISADS)
System integration in offshore supply vessels – how we applied DDS and redefi...
Integrating DDS into AXCIOMA - The Component Approach
Distributed Communication and Control for a Network of Melting Probes in Extr...
MiroSurge: Research Platform for Robotic Surgery

Recently uploaded (20)

PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
AI in Product Development-omnex systems
PPTX
Introduction to Artificial Intelligence
PPTX
Transform Your Business with a Software ERP System
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
medical staffing services at VALiNTRY
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
System and Network Administraation Chapter 3
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
top salesforce developer skills in 2025.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
AI in Product Development-omnex systems
Introduction to Artificial Intelligence
Transform Your Business with a Software ERP System
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
medical staffing services at VALiNTRY
Odoo POS Development Services by CandidRoot Solutions
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
L1 - Introduction to python Backend.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PTS Company Brochure 2025 (1).pdf.......
System and Network Administraation Chapter 3
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
ManageIQ - Sprint 268 Review - Slide Deck
top salesforce developer skills in 2025.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
CHAPTER 2 - PM Management and IT Context
Adobe Illustrator 28.6 Crack My Vision of Vector Design

IoT Panel, Part II: Security for Silicon, Software, and Sensors

  • 1. IoT Panel Discussion, Part II: Security for Silicon, Software, and Sensors Moderator: Curt Schwaderer Technology Trends Specialist OpenSystems Media Speakers: Tu Le, Sr. Product Manager, Flexera Software James Kirkland, Chief Architect, IoT & Intelligent Systems, Red Hat Stan Schneider, Ph.D., CEO, RTI Dave Hart, Chief Technology Officer, ThingWorx
  • 2. Agenda  Housekeeping  Panel Discussion  Questions and Answers  Wrap-up
  • 3. Tu Le, Senior Product Manager, Flexera Software Tu Le is a senior product manager for Flexera software. Tu is responsible for the FlexNet Licensing technology (FlexNet Publisher and FlexNet Embedded). Tu has over 14 years of security experience in Cryptography, Anti-piracy and Software Licensing and Entitlement Management.
  • 4. James Kirkland, Chief Architect, IoT & Intelligent Systems, Red Hat James Kirkland is Chief Architect for the Internet of Things and Intelligent Systems at Red Hat. He has been working with Unix and Linux variants for 20 years. He has been working with on IoT solutions in the transportation and energy sectors for the last five years. He is a frequent public speaker and writer on a wide range of technical topics. He is the co-author of Linux(R) Troubleshooting for System Administrators and Power Users (ISBN: 0131855158) published by PrenticeHall PTR.) Picture goes here
  • 5. Stan Schneider, Ph.D., CEO, RTI Stan Schneider is CEO at Real-Time Innovations (RTI), the Industrial Internet of Things connectivity platform company. RTI is the largest embedded middleware vendor and has an extensive footprint in all areas of the Industrial Internet, including Energy, Medical, Automotive, Transportation, Defense, and Industrial Control. Stan is also a member of the Industrial Internet Consortium Steering Committee. Stan completed his PhD in Electrical Engineering and Computer Science at Stanford University, and holds a BS and MS from the University of Michigan. He is a graduate of Stanford's Advanced Management College.
  • 6. Dave Hart, Chief Technology Officer, ThingWorx Dave is the CTO of the ThingWorx IoT segment at PTC, where he is directly responsible for the ThingWorx engineering teams continued delivery of innovative IoT platform capabilities. Dave is an expert in the IoT space, leading successive generations of remote connectivity platforms and solutions, playing key roles in designing, evangelizing, and realizing innovative connected product solutions. Dave joined PTC as part of the Axeda acquisition, where as CTO he drove Axeda¹s technology and product development teams. Prior to Axeda Dave provided technical leadership and direction for Questra¹s Intelligent Device Management platform from product inception through the ultimate acquisition by Axeda. In addition to product development, Dave has developed and led solution architecture, product management, and professional services organizations in ensuring the successful deployment of connected products in the marketplace.
  • 7. Security Applications & Architecture IoT applications range from consumer to industrial. In many cases, the lines are blurring and consumer devices are finding their way into connecting/communications with critical systems.  What are distinguishing characteristics of Industrial versus consumer IoT applications?  What are the architectural components?  What are the security concerns?
  • 8. Security Architecture Many embedded and enterprise systems implement a security architecture. IoT is no different, but has unique security concerns.  What kinds of bad things can happen in IoT applications?  What considerations go into the security architecture?  Are there important components to address? – Authentication? Corruption? Spoofing? Back-doors that can allow hackers to control the system? Attempts to steal SW or intellectual property within the IoT system?
  • 9. Security Considerations for Silicon, SW, Sensors  Sensor Security: How to verify access to sensor information and prevent spoofing of sensor data to the collection?  Silicon & SW Security: Capabilities built into the silicon and/or software to prevent hacking, back doors, SW corruption, enabling/disabling features, etc.  Cloud services: How to protect the data in the cloud? How to authenticate and secure sensor & SW information coming into and going out of the cloud for the application?
  • 10. Audience Q & A Tu Le, Flexera Software James Kirkland, Red Hat Stan Schneider, RTI Dave Hart, ThingWorx
  • 11. Sponsor Resources Flexera Software: How Can You Monetize the Internet of Things? 5 Tips to Get Started http://media.flexerasoftware.com/documents/eBook-SWM-Monetize-IoT.pdf Red Hat: An Intelligent Systems Solution for the Internet of Things http://www.redhat.com/en/files/resources/en-rh-intelligent-systems-solution-internet-of-things.pdf RTI: Is Your Data Secure? http://www.rti.com/whitepapers/Is_Your_Data_Secure.pdf ThingWorx Security Whitepaper: Providing Secure Connected Products http://bit.ly/1LaSXO8
  • 12. Thanks for joining us Event archive available at: http://ecast.opensystemsmedia.com/ E-mail us at: jgilmore@opensystemsmedia.com