Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Action of Bayern innovativ on the subject of Wireless Security in IoT
IT Security Talks Management I

Wireless Security in IoT

The frequency and severity of IT security incidents in the industrial IoT is increasing signifi-cantly. Another popular target for hacker attacks is wireless connectivity.

calendar_today Thu, 17.06.2021, 13:00 - 15:00

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Moderator

south_east

Themes

Identity and access management Industry 4.0 / IoT / Edge Computing Mobile Security Trend topic

Event

This action is part of the event IT Security Talks

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

ACTION DESCRIPTION

The thematic platform Cybersecurity and the Thinknet 6G of the Centre for Digitalisation Bavaria operated by Bayern Innovativ has brought together proven experts in the session "Wireless Security in the Industrial IoT". They will present proposed solutions from the perspective of their domain beyond the threat scenario. What to expect:

 

IT security and automated network & service management

David Hock, Infosim

5G, WLAN, LoRa, Sigfox - there are more and more wireless networks in industrial environments to manage securely. This usually exceeds the limited resources of medium-sized companies. How can operations nevertheless be organised securely? Mr David Hock, Director of Research at infosim GmbH, describes the pitfalls of network configuration and avoidable weak points in operation from the perspective of medium-sized users.

 

5G and OT Security

Josef Urban, Nokia

In 5G campus networks, 5G security meets OT (operational technology) security and the security requirements of industrial control systems. Mr. Josef Urban, Technology Lead at Nokia Germany, describes how both complement each other and thus "harden" the overall system.

 

Lifecycyle Management for Private 5G Networks

Sharath Muddaiah, G+D Mobile Security GmbH

How do you securely onboard your IoT devices and your customers & employees into your Private dedicated Networks? Mr Sharath Muddaiah, Director Strategic Solutions & Business Development at G+D Mobile Security GmbH explains why security needs to be considered from day 1 and how G+D extend their massive expertise and learnings coming from Mobile Network Operator Networks into Private Networks.

 

Security Canvas - IoT Security integrated in Product Development and Life Cycle

Dr. Jürgen Acker, conplement AG

Secure wireless networking of end devices in the IoT - Dr. Jürgen Acker, Embedded Architect, Product Security Officer at conplement AG uses the Security Canvas approach to describe how IoT end-to-end solutions with wireless interfaces can be securely developed from the initial idea and securely operated throughout the entire product life cycle.

 

Perhaps you are currently considering how to improve the security of your wireless networks or have valuable experience to contribute yourself - then this session on 17.06.2021 at 1 pm is the right place for you.



... read more

Language: English

Questions and Answers: Yes

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.