POPULARITY
Each day we are bombarded by cybersecurity threats and this episode adds another vector you should be looking at as you address your asset inventory. Are you looking at the asset that controls your thermostat? How about the IP cameras you use to secure your office? These are just some of the many questions as I sit down with Huxley Barbee of Run Zero. It isn't all doom and gloom but the outlook is definitely scary if we don't start taking action to secure the devices that often are ignored or the responsibility and burden is assumed to be already handled. --- Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
On this episode of the IoT: The Internet of Threats podcast, host Eric Greenwald and Larry Pesce (Finite State Director of Product Security Research and Analysis) delve into the recently announced U.S. Cyber Trust Mark, a cybersecurity labeling program for IoT devices - a long-anticipated directive of Executive Order 14028. Larry and Eric explore how, in contrast to static ratings like ENERGY STAR, this dynamic IoT security score will attempt to reflect the continually evolving landscape of cybersecurity threats and controls. They delve into the efficacy of this voluntary labeling program: Will consumers use it? Will manufacturers comply (and raise prices) or ignore it? Together, Larry and Eric discuss the initial criteria for assigning these security scores and the user-friendly implementation strategies like QR codes. They also tackle the implications of this program on various connected devices, from baby monitors to solar panels, analyzing whether this voluntary program will see widespread adoption across various industries with varied potential risks (from privacy violations to deadly fires). In the discussion, Larry turns the tables and asks Eric about the FCC's unexpected role in enforcing IoT labeling compliance and how this labeling initiative aligns with the broader trend towards transparency and accountability in device security regulation and progress. Interview with Larry Pesce Since joining Finite State, Larry has been providing expert product security program design and development as well as IoT pen testing services and guidance to product security teams worldwide. He is also a Certified Instructor at the SANS Institute and has co-hosted the Paul's Security Weekly podcast since 2005. Before joining Finite State, Larry spent 15 years as a penetration tester (among other various roles) focused on healthcare, ICS/OT, wireless, and IoT/IIoT embedded devices. Larry holds several GIAC certifications and earned his B.S. in Computer Information Systems from Roger Williams University. Join in on this insightful discussion where Eric and Larry consider: Similarities and differences between the IoT labeling and ENERGY STAR rating programs The need to reflect the ever-changing nature of cybersecurity risk and controls within cybersecurity scores How, and how much, consumers will actually use the score and value higher-rated devices Criteria considered when assigning the scores and where labels will appear The varying impacts of a voluntary IoT labeling program on consumer vs. industrial connected device cybersecurity The surprising role of the FCC as the enforcing regulator for IoT labeling compliance Find Larry on LinkedIn: Larry Pesce: https://linkedin.com/in/larrypesce Learn more about Finite State: https://finitestate.io/ Thank you for listening to this episode of the IoT: The Internet of Threats podcast, powered by Finite State — the leading supply chain cyber-security solution provider for connected devices and embedded systems. If you enjoyed this episode, click subscribe to stay connected and leave a review to get the word out about the podcast. To learn more about building a robust software supply chain security program, protecting your connected devices, and complying with emerging regulations and technical standards, visit https://finitestate.io/
On this episode of the IoT: The Internet of Threats podcast, host Eric Greenwald and Larry Pesce (Finite State Director of Product Security Research and Analysis) explore the FDA's new Refuse to Accept (RTA) decision process and what it means for successful premarket submissions of medical devices. Together, Larry and Eric examine how prepared the industry is for the coming changes and assess how medical device manufacturers may weigh the new risk-benefit calculus. Eric and Larry also look at how past cyberattacks lead companies to forge enduring changes in cybersecurity culture and controls and discuss whether these regulatory changes will bring about significant improvements in securing connected medical devices. Interview with Larry Pesce Since joining Finite State, Larry has been providing expert product security program design and development as well as IoT pen testing guidance and services to product security teams worldwide. He is also a Certified Instructor at the SANS Institute and has co-hosted the Paul's Security Weekly podcast since 2005. Before joining Finite State, Larry spent 15 years as a penetration tester (among other various roles) focused on healthcare, ICS/OT, wireless, and IoT/IIoT embedded devices. Larry holds several GIAC certifications and earned his B.S. in Computer Information Systems from Roger Williams University. In this episode, Eric and Larry discuss the: FDA's new Refuse-To-Accept (RTA) decision authority and what it means for SBOMs and the premarket submissions of medical devices Whether the medical device sector is adequately prepared for these changes How the new regulations may alter the liability vs. risk tolerance question for medical device manufacturers The extent to which the FDA will rigorously enforce the new premarket submission requirements The potential qualitative difference this new regulation may bring to the the overall security of medical devices How cyberattacks often lead companies to make meaningful, lasting changes in their cybersecurity practices Find Larry on LinkedIn: Larry Pesce: https://linkedin.com/in/larrypesce Learn more about Finite State: https://finitestate.io/ Thank you for listening to this episode of the IoT: The Internet of Threats podcast, powered by Finite State — the leading supply chain cyber-security solution provider for connected devices and embedded systems. If you enjoyed this episode, click subscribe to stay connected and leave a review to get the word out about the podcast. To learn more about building a robust software supply chain security program, protecting your connected devices, and complying with emerging regulations and technical standards, visit https://finitestate.io/
Don't miss this week's episode as Ken Forster sits down with Alistair Fulton, a seasoned expert in wireless technology. As the former Senior Vice President and General Manager at Semtech, Alistair has an impressive track record of building successful businesses in the IoT/IIoT space. Tune in to gain valuable insights from this industry pro on the latest advancements in wireless tech and the future of connectivity.
On this episode of the IoT: The Internet of Threats podcast, host Eric Greenwald sits down with Larry Pesce, a lifelong tinkerer whose obsession with how things work led him to his role as Finite State's new Product Security and Analysis Director. Together they explore how Larry began his long and accomplished career as a pen tester and security and research expert. Eric and Larry also examine the pressure that lower production budgets impose on product security professionals, the questionable value of regulation as a catalyst to drive product security investment and improvements, and the potential role SBOMs can play in cybersecurity. Interview with Larry Pesce Since joining Finite State, Larry has been serving as a senior consultant, providing expert product security program design and development and IoT pen testing guidance and services to product security teams worldwide. He is also a Certified Instructor at the SANS Institute and has co-hosted the Paul's Security Weekly podcast since 2005. Before joining Finite State, Larry spent 15 years as a penetration tester (amongst his various roles) focused on healthcare, ICS/OT, wireless, and IoT/IIoT embedded devices. Larry holds several GIAC certifications and earned his B.S. in Computer Information Systems from Roger Williams University. In this episode, Eric and Larry discuss: What it was like to pioneer the Paul's Security Weekly podcast in the early days of podcasting (and co-hosting the show for the last 17 years!) How Larry's early interest in taking things apart led to a career in embedded device security and, eventually, to Finite State How the drive to lower production costs pressures manufacturers to sacrifice invisible differentiators like product security Whether regulation can serve as an effective mechanism in encouraging product security improvements How companies can work to overcome the complexities of product security programs The SBOM as a product security tool and whether it could also be a roadmap attackers can use to target your connected device ecosystem Find Larry on LinkedIn: Larry Pesce: https://www.linkedin.com/in/larry-pesce-6715b73/ Learn more about Finite State: https://finitestate.io/ Thank you for listening to this episode of the IoT: The Internet of Threats podcast, powered by Finite State — the leading supply chain cyber-security solution provider for connected devices and embedded systems. If you enjoyed this episode, click subscribe to stay connected and leave a review to get the word out about the podcast. To learn more about building a robust product security program, protecting your connected devices, and complying with emerging regulations and technical standards, visit https://finitestate.io/
Currently, Matt is the CEO & Co-Founder of OODA LLC. Prior to OODA, Matt was the EVP for Strategy and Operations at Tulco Holdings. Previously, Mr. Devost was a Managing Director at Accenture where he led the Global Cyber Defense practice responsible for Accenture's cloud, mobile, infrastructure, network, endpoint, incident response, threat intelligence, threat hunting, vulnerability management, IOT/IIOT, and red teaming offerings. Mr. Devost joined Accenture following their 2015 acquisition of the global cybersecurity consultancy FusionX LLC where he had served as President & CEO since 2010. As a Founder of FusionX, Mr. Devost helped an international clientele identify and manage dynamic threats in complex operational environments. Mr. Devost was an Adjunct Professor at Georgetown University for fourteen years teaching the flagship graduate course entitled “Information Warfare and Security”, and is a Founding Director of the Cyberconflict Studies Association. Mr. Devost was also appointed as a special government advisor to counsel the U.S. Department of Defense leadership on a variety of security issues from 2010-2013. Mr. Devost was a founder of the Terrorism Research Center, Inc. (TRC) in 1996, where he served as President and CEO until November 2008. As founder and President, Mr. Devost oversaw all research, analysis, intelligence, assessment, and training programs including the development of the renowned “Mirror Image” training program, the Responder Knowledge Base, and the Terrorism Early Warning Group program which established local intel fusion centers in 56 high-threat U.S. cities. In addition to his duties as President, Mr. Devost also provided strategic consulting services to select international governments and corporations on issues of counter-terrorism, intelligence, information warfare and security, critical infrastructure protection, and homeland security. In 2004, Mr. Devost was appointed to the Defense Science Board Task Force on Critical Homeland Infrastructure Protection to provide advice to the Department of Defense and Department of Homeland Security. Mr. Devost served as a Senior Advisor to the Airline Pilots Association National Security Committee and is and adjunct member of the Los Angeles Terrorism Early Warning Group. Today's Sponsor: BUB's Naturals https://www.BUBSNATURALS.com/ Use the code "TEAMHOUSE" for 20% your order! Pick up their collagen protein, MCT oil, and apple cider vinegar gummies today! BUBS Donates 10% of all profits to charity in Glens honor, starting with the Glen Doherty Memorial Foundation GO TO: https://www.BUBSNATURALS.com/?discount=TEAMHOUSE or Use the code "TEAMHOUSE" at checkout for 20% off your order! FEEL GREAT. DO GOOD. Words that we live by. To help support the show and for all bonus content including: -2 bonus episodes per month -Access to ALL bonus segments with our guests -Ad Free audio feed Subscribe to our Patreon!
Podcast: Unsolicited Response Podcast (LS 33 · TOP 5% what is this?)Episode: Mikko Hypponen: If It's Smart, It's VulnerablePub date: 2022-08-10Dale Peterson talks with Mikko Hypponen about his new book: If It's Smart, It's Vulnerable. As with all books, Dale asks who Mikko wrote the book for, who is the intended reader. Then they dig into some of the interesting parts for the security professional including: What security tasks should we expect users to do (and why security training fails) Whose responsible for IoT/IIoT cybersecurity? How are we going to succeed in security IoT, and what regulation might work? Hypponen's Law: If It's Smart, It's Vulnerable Cyber Deterrence Why have their been so few cyber attacks on critical infrastructure? and more. Links If It's Smart, It's Vulnerable book S4x23 Call For Presentations The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Dale Peterson talks with Mikko Hypponen about his new book: If It's Smart, It's Vulnerable. As with all books, Dale asks who Mikko wrote the book for, who is the intended reader. Then they dig into some of the interesting parts for the security professional including: What security tasks should we expect users to do (and why security training fails) Whose responsible for IoT/IIoT cybersecurity? How are we going to succeed in security IoT, and what regulation might work? Hypponen's Law: If It's Smart, It's Vulnerable Cyber Deterrence Why have their been so few cyber attacks on critical infrastructure? and more. Links If It's Smart, It's Vulnerable book S4x23 Call For Presentations
Brian Gilmore (@BrianMGilmore, Director IoT/Emerging Technology @InfluxDB) talks about Edge and Industrial Edge Computing, as well as application and data challenges at the edge.SHOW: 634CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwCHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"SHOW SPONSORS:CloudZero - Cloud Cost Intelligence for Engineering TeamsStreamline on-call, collaboration, incident management, and automation with a free 30-day trial of Lightstep Incident Response, built on ServiceNow. Listeners of The Cloudcast will also receive a free Lightstep Incident Response T-shirt after firing an alert or incident.Pay for the services you use, not the number of people on your team with Lightstep Incident Response. Try free for 30 days. Fire an alert or incident today and receive a free Lightstep Incident Response t-shirt.Datadog Application Monitoring: Modern Application Performance MonitoringGet started monitoring service dependencies to eliminate latency and errors and enhance your users app experience with a free 14 day Datadog trial. Listeners of The Cloudcast will also receive a free Datadog T-shirt.SHOW NOTES:InfluxData (homepage) - InfluxDB - Time Series PlatformUnderstanding Time Series Database Platforms (Cloudcast Eps:394)Topic 1 - Welcome to the show. Before we get into the fascinating world of Edge and IoT, tell us a little bit about your background, and then where you focus these days with InfluxData.Topic 2 - It's been a little while since we covered IoT and IIoT. In the past it was somewhat of a fragmented market segment (lots of definitions, lots of different use-cases). How do you summarize the IoT and IIoT markets in 2022? Topic 3 - We've always said that the sensor part of IoT isn't very interesting, but what a company does with the data is very interesting (and complicated). How do companies think about edge data these days – what aspects of the data are valuable? Topic 4 - Time Series databases seem like the perfect fit for IoT and IIoT use-cases because they are designed to be both real-time and give historical context (from a time perspective). Is this the case, and why do companies ever consider other types of databases at the edge?Topic 5 - What are the current best practices about managing data at the edge, in terms of long-term retention and what they eventually do with the data (analysis, analytics, etc.) to better optimize those edge applications? Topic 6 - What are some of the emerging trends you're starting to see happen at the edge, that maybe weren't on the industry radar a few years ago? FEEDBACK?Email: show at the cloudcast dot netTwitter: @thecloudcastnet
Daniele Catteddu, Chief Technology Officer with Cloud Security Alliance speaks to Don Witt of the Channel Daily News, a TR publication about the history of the CSA and what they have accomplished over the years and recently with the launch of the Zero Trust Advancement Center. The goal of the ZTAC is provide best practices, recommendations, training and education and awareness on Zero Trust. There is a lot of attention on IoT and IIoT device supply chains, their vulnerabilities as well as potential breaches during production which Daniele addresses. Listen in as he also describes how Zero Trust can help protect IoT and IIoT systems. In addition, he covers certifications for IoT devices, which were not well implemented in the past, but are now becoming available with a recommended IoT security framework. (CSA) IoT control framework V3 Daniele Catteddu About: The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA's activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs, and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. For more information, go to: https://cloudsecurityalliance.org/zt/ https://cloudsecurityalliance.org/press-releases/2022/04/26/cloud-security-alliance-updates-internet-of-things-iot-controls-matrix-with-new-incident-management-domain-and-enhanced-technical-clarity-and-referencing/ https://cloudsecurityalliance.org/artifacts/iot-security-controls-framework-v3/ https://cloudsecurityalliance.org/artifacts/guide-to-the-iot-security-controls-framework-v3/
In Episode S4E5, we have as our guests two individuals who are distinguished by their work with the Industry IoT Consortium (IIC). Bassam Zarkout—Executive Vice President IGnPower Inc. and the Chief Editor of the Industrial IoT Artificial Intelligence Framework (IIAIF). Wael Diab—Chair IIC Industrial AI Task Group and Secretary IIC Steering Committee. About the IIC Since its founding in 2014, the IIC has helped build a technical foundation for the Industrial IoT. They work to help organizations take advantage of IoT technology and achieve positive outcomes. They are focused on driving technology innovation that fosters business transformation. Their services are targeted toward helping members drive business value in the core verticals of IT, Networks, Academia & Research, Manufacturing, Energy & Utilities, and Healthcare. They provide best-practice frameworks and liaisons with Standards Development Organizations. Topics we cover: The purpose of the Industrial IoT Artificial Intelligence Framework Examples of some applications for AI in IIoT The value proposition AI can enable in next-generation industrial IoT (IIoT) systems Perceptions regarding ethics, confidence, trustworthiness of AI About our guests: Bassam Zarkout is the Chair of the Digital Transformation working group at the Industry IoT Consortium. He is an Ottawa-based technology executive with 30+ years of experience in technology organizations in Canada, the US, and Europe, including 8 years in executive C-positions, mainly as CTO. Bassam is the founder of IGnPower, an IIoT and AI strategy consulting practice. He has authored and contributed to multiple peer-reviewed papers and frameworks covering Digital Transformation, Industrial AI, Trustworthiness, Data Protection, and IoT Security. He is also a veteran of the Information Assets Governance space, including Electronic Records Management, RegTech, Content Management, and Electronic Discovery, and has led research with US DoD in the area of assisted security and privacy classifications of content. Wael Diab is a business and technology strategist with over 885 patents to his name in the fields of networking and ICT. Wael has BS and MS degrees in EE and BA in Economics from Stanford, and an MBA with honors from Wharton. He is a published author, having authored the book Ethernet in the First Mile: Access for Everyone. In 2011, Wael was recognized by the David Packard Medal of Achievement and Innovator Award for his leadership in Green Technology. He has been active in standardization and related activities for two decades. He chairs ISO/IEC JTC 1/SC 42, the international standardization committee on artificial intelligence (AI). Wael is also chairing the AI track of the 22nd Global Standards Collaboration meeting (GSC-22). Don't miss this opportunity to learn more about AI in security and IIoT applications.
Operational technology leaders are at crossroads as the digitization of the industrial world accelerates. In one direction is the legacy "IT-centric" approach to data security that is ill-suited for OT and IoT systems. The other is extending the zero trust model to devices, effectively hiding hard-to-access and hard-to-patch, agentless IP-enabled sensors and data-generating assets from the Internet and shielding them from your attack surface. In this episode, Pam, Lisa, and guest Deepak Patel from the Zscaler Office of the CEO detail why zero trust is the best path forward for plant and factory owners to secure their assets and be more agile and resilient.
Denis Doeland mocht te gast zijn bij Trends in Business, de talkshow van De Ondernemer en T-Mobile waarbij trends voor ondernemers onder de loep worden genomen. Spreker, futurist en ondernemer Igor Beuker rukt de motorkap open van de Vierde Industriële Revolutie en presenteert een dertigtal trends en exponentiële technologieën. Trends in Business bestaat uit drie episodes: Digitale Transformatie, 5G en Internet of Things. Hier vind je derde aflevering, over the Internet of Things (IoT). In deze talkshow gaat Denis in op voordelen van IoT- en die zijn niet miniem. Machines kunnen dankzij IoT naadloos met elkaar communiceren en dat zorgt voor grote besparingen. Distributie en logistiek vallen ook beter te stroomlijnen, wat voor enorme efficiencyverbeteringen in warehousing zorgt. IoT helpt ondernemers om betere besluiten te nemen.
OODA CEO Matt Devost has a track record of executing on innovation via entrepreneurship. He has extensive past performance in cybersecurity, counterterrorism, critical infrastructure protection, intelligence, and risk management issues, and deep experience in delivering value in those domains via entrepreneurship. In this OODAcast, Jen Hoar extracts lessons and insights from Matt's journey that will be relevant to creators, innovators and entrepreneurs at any stage of their journey. Some topic covered: - How will you know when it is the right time to start your business? - How should you evaluate risks of the new business endeavor? - How do you establish credibility with potential investors? What about potential clients? - How do you sell? - What is the best way to listen to potential clients? - What is your story and how do you articulate it? - What doesn't work? What common mistakes have you seen or experienced yourself? Currently, Matt is the CEO & Co-Founder of OODA LLC. Prior to OODA, Matt was the EVP for Strategy and Operations at Tulco Holdings. Previously, Mr. Devost was a Managing Director at Accenture where he led the Global Cyber Defense practice responsible for Accenture’s cloud, mobile, infrastructure, network, endpoint, incident response, threat intelligence, threat hunting, vulnerability management, IOT/IIOT, and red teaming offerings. Mr. Devost joined Accenture following their 2015 acquisition of the global cybersecurity consultancy FusionX LLC where he had served as President & CEO since 2010. As a Founder of FusionX, Mr. Devost helped an international clientele identify and manage dynamic threats in complex operational environments. Additional Links: Matt's writing at OODA Loop Follow Matt on Twitter Connect with Matt on LinkedIn Subscribe to Matt's Global Frequency List Matt's Book Recommendations
„Wirtschaftsspionage hat es schon immer gegeben!“ - Cybersecurity, Smart Home, digitale Arbeitswelt, E-Mobilität und mehr. Digitalisierung ist der Treiber von heute und ja, es ist auch ein Dauerthema in diesem Podcast. Wenn es in den Medien um Digitalisierung und Sicherheit geht, dann wird sehr häufig mein heutiger Gast, Prof. Dr. Thomas R. Köhler, als Experte befragt. Ob nun ARD, ZDF, NTV, Pro7, Handelsblatt, Die Welt, Computerwoche, und viele mehr oder auch Technologie Events wie die IAA oder das BMW Future Forum – er wird befragt. Heute beantwortet er meine Fragen im Podcast! Ein spannendes Klartext-Gespräch über Cyber Security, smarte Sicherheitslücken, autonomes Fahren und IOT / IIOT. Erfahre in diesem Interview: - Welche Einfallstore im persönlichen Zuhause für digitale Angreifer bestehen. - Weshalb die Produktivität im Home Office abhängig vom Menschen und seiner Aufgabe ist. - Inwieweit die heutigen Debatten zur Arbeitswelt Wiederholungen früherer Prognosen sind. - Warum viele interne Tätigkeiten überflüssig werden, wenn sich das interne Team nicht strategisch sondern nur operativ aufstellt. - Weshalb das IIOT zu Risiken für Leib und Leben führen kann. - Welche Folgen eine Cyberattacke haben kann. - Weshalb Wirtschaftsspionage heute so einfach ist. - Wieso grundlegendes Wissen im Bereich Cyber Security so wichtig ist. - Welche Probleme beim autonomen Fahren noch gelöst werden müssen. - Warum wir permanent schauen sollten, wie wir aufgestellt sind – wertvoll oder wertlos. - Wie man Honorarprofessor in China wird. Nimm diese Impulse mit: - Mit jeder Art der Vernetzung hole ich mir eine potenzielle Sicherheitslücke ins Haus! - Sicherheit ist das Gegenteil von Einfachheit! - Eine unternehmerische Gesamtverantwortung für Finanzen und IT ist meist ein Rezept für Desaster ! - Es war zu allen Zeiten so, dass man sich gerne bei der Konkurrenz umgeschaut hat! - Vielen Unternehmen sind die Gefahren aus der Cyber Security nicht bewusst! - Die Cyber Branche ist ein Minenfeld! - Ein autonomes Fahrzeug ist irgendwie immer Fahranfänger! - Das Merkmal des Pioniers ist, dass auch mal etwas schief geht! - Umbrüche in der Basistechnologie führen zu lawinenartigen Folgewirkungen! - Wer nicht selbst über sich entscheidet, erlaubt anderen die Entscheidung! Deshalb: hören und lernen!
„Wirtschaftsspionage hat es schon immer gegeben!“ - Cybersecurity, Smart Home, digitale Arbeitswelt, E-Mobilität und mehr. Digitalisierung ist der Treiber von heute und ja, es ist auch ein Dauerthema in diesem Podcast. Wenn es in den Medien um Digitalisierung und Sicherheit geht, dann wird sehr häufig mein heutiger Gast, Prof. Dr. Thomas R. Köhler, als Experte befragt. Ob nun ARD, ZDF, NTV, Pro7, Handelsblatt, Die Welt, Computerwoche, und viele mehr oder auch Technologie Events wie die IAA oder das BMW Future Forum – er wird befragt. Heute beantwortet er meine Fragen im Podcast! Ein spannendes Klartext-Gespräch über Cyber Security, smarte Sicherheitslücken, autonomes Fahren und IOT / IIOT. Erfahre in diesem Interview: - Welche Einfallstore im persönlichen Zuhause für digitale Angreifer bestehen. - Weshalb die Produktivität im Home Office abhängig vom Menschen und seiner Aufgabe ist. - Inwieweit die heutigen Debatten zur Arbeitswelt Wiederholungen früherer Prognosen sind. - Warum viele interne Tätigkeiten überflüssig werden, wenn sich das interne Team nicht strategisch sondern nur operativ aufstellt. - Weshalb das IIOT zu Risiken für Leib und Leben führen kann. - Welche Folgen eine Cyberattacke haben kann. - Weshalb Wirtschaftsspionage heute so einfach ist. - Wieso grundlegendes Wissen im Bereich Cyber Security so wichtig ist. - Welche Probleme beim autonomen Fahren noch gelöst werden müssen. - Warum wir permanent schauen sollten, wie wir aufgestellt sind – wertvoll oder wertlos. - Wie man Honorarprofessor in China wird. Nimm diese Impulse mit: - Mit jeder Art der Vernetzung hole ich mir eine potenzielle Sicherheitslücke ins Haus! - Sicherheit ist das Gegenteil von Einfachheit! - Eine unternehmerische Gesamtverantwortung für Finanzen und IT ist meist ein Rezept für Desaster ! - Es war zu allen Zeiten so, dass man sich gerne bei der Konkurrenz umgeschaut hat! - Vielen Unternehmen sind die Gefahren aus der Cyber Security nicht bewusst! - Die Cyber Branche ist ein Minenfeld! - Ein autonomes Fahrzeug ist irgendwie immer Fahranfänger! - Das Merkmal des Pioniers ist, dass auch mal etwas schief geht! - Umbrüche in der Basistechnologie führen zu lawinenartigen Folgewirkungen! - Wer nicht selbst über sich entscheidet, erlaubt anderen die Entscheidung! Deshalb: hören und lernen!
Industry: transportation. Business impact: sustainability, customer service. The critical role of unifying real-time data sources at TraPac, with Mark Jensen, Vice President of Asset Management. How data organization can improve customer service and sustainability. Visit us at https://www.osisoft.com/resource-library/ to search through thousands of use cases by customers in the world's largest process and production industries. #Data #sustainability #OSIsoft #PISystem #data #IoT #IIoT
Industry: forest and paper products. Business impact: digital transformation. How Rank Group Ltd, a leading holding company for packaging companies, is improving operations with real-time plant floor data, with Larry Shutzberg, Executive Vice President, Information Technology. Visit us at https://www.osisoft.com/resource-library/ to search through thousands of use cases by customers in the world's largest process and production industries. #digitaltransformation #processoptimization #realtimedata #IoT #IIoT
There are two primary industries within the Internet of Things (IoT): industrial IoT (IIoT) and consumer IoT (CIoT), both of which can benefit from the Apache Kafka® ecosystem, including Kafka Streams and Kafka Connect. Kai Waehner, who works in the advanced tech group at Confluent with customers, defining their needs, use cases, and architecture, shares example use cases where he’s seen IoT integration in action. He specifically focuses on Walmart and its real-time customer integration using the Walmart app. Kafka Streams helps fine-tune the Walmart app, optimizing the user experience, offering a seamless omni-channel experience, and contributing to business success. Other topics discussed in today’s episode include integration from various legacy and modern IoT data sources, latency sensitivity, machine learning for quality control and predictive maintenance, and when event streaming can be more useful than traditional databases or data lakes.EPISODE LINKSApache Kafka 2.5 – Overview of Latest Features, Updates, and KIPsMachine Learning with Kafka Streams, Kafka Connect, and ksqlDB ft. Kai WaehnerBlog posts by Kai WaehnerProcessing IoT Data from End to End with MQTT and Apache Kafka®End-to-End Integration: IoT Edge to Confluent CloudApache Kafka is the New Black at the Edge in Industrial IoT, Logistics, and RetailingApache Kafka, KSQL, and Apache PLC4X for IIoT Data Integration and ProcessingStreaming Machine Learning at Scale from 100,000 IoT Devices with HiveMQ, Apache Kafka, and TensorFlowEvent-Model Serving: Stream Processing vs. RPC with Kafka and TensorFlowJoin the Confluent Community SlackLearn about Kafka at Confluent Developer
Swimlane CEO Cody Cornell is joined by Rule4 co-CEO Trent Hein to discuss the internet of things (IoT). Listen as they expand on both consumer IoT and industrial IoT (IIoT) and how automation is key to securing the world's growing network of devices.
IoT (IIoT) bridges the gap between legacy industrial equipment and infrastructure and new technologies, such as machine learning, cloud, mobile, and edge computing. In this session, we focus on how you can extract data from your industrial data sources and build operational insights using AWS IoT services. We cover how to bridge traditional on-premises applications and data stores with new cloud-based IoT applications.
Talking with Tim Berglund, Senior director of Developer Experience for Confluent about Kafka and what it can offer those that are building an IoT/IIoT data pipeline architecture. Apologies for the sound quality, as we have not had a chance to tune up our equipment after our office move.
Today, I have the pleasure to sit with Arun Santhebennur, Co-Founder and COO of an industrial IoT (IIoT) startup based in San Jose called PetaSense. Industrial IoT has really come to the forefront through efforts by General Electric (Predix), other large digital industrial companies, and a burgeoning cadre of entrepreneurs. Tons of data is created from manufacturing technologies that are currently not being captured, and old technology is not equipped with sensors that would allow manufacturers to understand what is actually happening with their equipment. Petasense wants to build an experience for manufacturing similar to the FitBit for our health. By retro-fitting manufacturing equipment with sensors to measure vibration, we can capture data to analyze the health of the machines. For every gas turbine, a $1M+ piece of equipment that is already instrumented, there are three or four hundred lower cost machines with rotating parts that aren't being tracked. With low-cost continuous monitoring technology, Petasense provides predictive maintenance to every machine with moving parts. The biggest cost in manufacturing is not necessarily repairing broken machines, rather the lost output from unplanned downtime. Often times, problems with a machine running at 75% efficacy is undetected, which costs the company extra power and lost output. Hidden problems may even cause the machine to break more quickly. If you are interested in the evolution of manufacturing, listen in.