Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of BxC Consulting
Forums it-sa Expo Knowledge Forum D

Why Secure Identities are crucial for IIoT and IoT

What we need to do to generate and manage secure identities and access to protect networked devices and services.

calendar_today Tue, 10.10.2023, 16:20 - 16:30

event_available On site

place Hall 7A, Booth 7A-106

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Identity and access management Industry 4.0 / IoT / Edge Computing

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

With increasing networking and the growing influence of autonomous devices and services in production areas and private environments, the importance of protecting these service components is growing. In particular, network devices are being entrusted with more extensive tasks for independent processing and no longer operating only in demarcated environments but are increasing in direct cooperation with humans. Secure operation can only be guaranteed if both identities and access to and from such components are designed to be secure throughout their entire lifecycle.

In most organizations, the availability of asset identities and their lifecycle is still the exception rather than the rule. The size of the task of introducing a comprehensive asset and identity management system, including the necessary lifecycle processes, makes that responsibility shy away. However, the expected complexity of networked IIoT and IoT networks cannot be managed economically without standardized and highly automated asset management processes. Therefore, organizations should identify and begin implementing approaches to manage this complexity for secure asset management.

The presentation will give an overview of the most important standards that should be applied by both manufacturers and operators when implementing secure identities for devices and services. The presentation will also highlight the issues organizations should address when implementing secure identities.
... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.