SlideShare a Scribd company logo
1 of 22
Download to read offline
www.2015.mes-production.we-conect.com
POST-EVENT REPORT
OVERVIEW
www.securityofthingsworldusa.com
Security of Things World USA took place on Nov 3-4 in San Diego, CA and was a huge
success. Security experts from all major business and industrial sectors met up to discuss
and define the most important issues when it comes to security and the Internet of Things.
We had the pleasure of welcoming a variety of very interesting expert speakers ranging from
the CISO of the FBI, Arlette Hart, talking about building security into the next generation of
things to Larry Clinton (CEO of ISA) sharing his cybersecurity scenario 2020 and 40 other
great talks.
Security by design
One thing became clear: Connected things are amongst us and will prevail even further in
business and daily life. We cannot afford to leave security to be an after-thought. Security
needs to move into the center of business and design strategies to ensure the safety and
privacy of businesses and individuals. Every company has different requirements but through
the right partnerships, standards, innovation and an open mind for the possibilities this new
era of technologies is opening up IoT security can be fully optimized.
Security of Things World USA is coming back in 2017 with the latest case studies and
approaches on how security is impacting the connected world. Don’t miss the only strategic
IoT Security event in the States. For more information go to:
www.securityofthingsworldusa.com
Superb organization, great interaction with
very knowledgeable people.
Preetam Sirur, S&P Global
“www.securityofthingsworldusa.com
KEYNOTES
www.securityofthingsworldusa.com
Larry Clinton
CEO
Internet Security Alliance
KEYNOTE: A global Cybersecurity Scenario 2020: The
impact of Digital Business on Security
Nick Yoo
Chief Security Architect
McKesson
KEYNOTE: Healthcare IoT Security Challenges
Jay Radcliffe
Senior Security Researcher
Rapid 7
KEYNOTE: The Hacker will see you now: a skeptical look
at connected medical devices
Darek Kominek
Senior Product Marketing Manager
OPC Foundation
KEYNOTE: Changing the game Cyber-Security vs.
Dynamic Cyber-Incident Response
John Mattison
Chief Medical Information Officer
Kaiser Permanente
KEYNOTE: How to create value of Security of IoT
Arlette Hart
CISO
FBI
KEYNOTE: Building Security into the Next Generation of
Things
Christine Kringer
Director of the National Security Division‘s Outreach
Program for the Protection of National Assets
Department of Justice
KEYNOTE: Combatting National Security Cyber Risks
Posed by the Internet of Things
Dr. Howard Shrobe
Director of Cybersecurity
CSAIL
KEYNOTE: Cyber Threats and the Internet of Things
Emily Heath
CISO
AECOM
PANEL DISCUSSION: Changing CISO perspective
Anahi Santiago
CISO
Christiana Care Health System
PANEL DISCUSSION: Changing CISO perspective
David Pollino
Deputy CISO
Bank of the West
PANEL DISCUSSION: Changing CISO perspective
Gary Hayslip
Deputy Director, CISO, Department of Information
Technology
City of San Diego
PANEL DISCUSSION: Changing CISO perspective
Austin Scott
SCADA Information Security Engineer
San Diego Gas and Electric
PANEL DISCUSSION: Identifying & resolving potential
threats across all systems and infrastructure
Britt Talbert
Former Senior Program Manager, Information Security
General Motors
PANEL DISCUSSION: Identifying & resolving potential
threats across all systems and infrastructure
Find out more about the Security of Things
World USA speaker panel here:
http://securityofthingsworldusa.com/en/speakers/
SPEAKERS
www.autonomous-driving-berlin.comwww.securityofthingsworldusa.com
Robert Richardson
Editorial Director
TechTarget's Security Media Group
Jeff O'Neil
Manager, IT Audit and Compliance
Dignity Health
Sekhar Nagasundaram
Senior Director, Information Security
Visa Inc
Francis Melemedjian
Chief Technology Officer
P2link
Vinay Gandhi
Senior Manager IT Compliance & Risk
Energy Future Holdings / Txu Energy
Marc Bown
Senior Security Engineer
Fitbit Inc
Preetam Sirur
Senior Director
S&P Dow Jones Indices
Thomas Doheny
IT Risk Officer
Federal Reserve Bank of New York
Dawn Sheirzad
Product Manager, Cyber Security
Macy's
Mark Ramsey
Chief Information Security Officer
ASSA ABLOY Group
Tristan Petak
Cyber Security Executive
Darktrace
Dr Pierre Boisrond
Information Security Engineering Team Lead
Aviall
Benjamin Collar
Head of Research Group, Cyber-Security
Siemens
Rainer Rodler
Project Manager of Product IT Security
ZF Friedrichshafen AG
Dr Michaela Iorga
Senior Security Technical Lead for Cloud Computing
NIST
Brad Burkle
Senior Account Executive
Venafi
Andrew Kling
Director Cyber Security and Architecture
Schneider Electric
Cherie Dawson
Global Cyber Product Leader
AIG Commercial Insurance
Jason Bareiszis
Cyber Security Incident Response Manager
Tetra Tech
Stuart Wagner
Director, Information Technology Security and Compliance
Enterprise Products Partners L.P.
Sasha Biskup
Information Security Director
Fitbit Inc
Adam Brand
Core-Member
I am The Cavalry
Jared Carstensen
CISO
CRH
Find out more about the Security of Things
World USA speaker panel here:
http://securityofthingsworldusa.com/en/speakers/
Very informative and good networking.
Taoheed Kassim, Maersk
“www.securityofthingsworldusa.com
www.securityofthingsworldusa.com
BUSINESS PARTNERS 2016
FIND OUT MORE
ABOUT OUR
PARTNERSHIP
OPPORTUNITIES
www.securityofthingsworldusa.com
MEDIA PARTNERS 2016
PRIMARY MEDIA PARTNERS
MEDIA PARTNERS
SUPPORTING ASSOCIATIONS
Very good chance to discuss and learn from others facing
similar challenges with securing IOT solutions.
Eric Devoy, BP
“
www.securityofthingsworldusa.com
ATTENDING COMPANIES
AECOM, AIG Commercial Insurance, ASSA ABLOY Group, Automated Logic Corporation, Aviall, Avira Romania,
Bank of the West, Bayshore Networks, Certified Security Solutions, CGI Federal, Christiana Care Health System,
City of San Diego, CRH, CSAIL, CVS Healthcare, Cypress Semiconductor Corporation, Darktrace, DENSO
International, Department Of The Navy, Dignity Health, Eaton Corporation, Energy Future Holdings, Enterprise
Products Partners, EPB, FBI, Federal Reserve Bank of New York, First Tech Federal Credit Union, First technology
federal credit union, Fitbit, Fortegra, General Motors, HID Global, Honeywell, Huawei, I am The Cavalry, Iden Trust,
INC Research, Inlet, Internet Security Alliance, Kaiser Permanente, Kentucky Retirement Systems, Laureate
International Universities, Macy's, Maersk Line, Matrikon, Matthews Asia, McKesson, Mondelez International, NASA,
Network World , NIST, Ozone International, P2link, Paulson & Co, Philips, Qualcomm, R.A Jones, Rapid 7,
Reynolds, S&P Dow Jones Indices, San Diego Gas & Electric, San Diego Unified Port District, SapientNitro,
Schneider Electric, Securitas, Siemens, Sierra Wireless, St. Jude Medical, Subex, TechTarget's Security Media
Group , Tetra Tech, The Norfolk & Dedham Group, The Reynolds and Reynolds Company, Time Warner Cable,
TrustInSoft, TRW Automotive, U.S. Department of Justice, UL, US Department of Defense, US Department of
Homeland Security, Van Eck Associates, Vectrus, Venafi, Vidder, Visa, Wells Fargo & Company, Women in
Security, Yokogawa, Zezez.com, ZF Friedrichshafen, ZingBox
www.securityofthingsworldusa.com
KEY TOPICS 2016
• Securing your cyber physical systems by bridging them with innovation: How can you assure
that the Security of your IoT business becomes one of your most valued assets?
• Expanding your IT Security in a digitalized world: Leverage your existing system security
experience and move towards a more complex approach by implementing intelligence led operations
• Business Continuity Management: Prepare your business for the unknown by anticipating
enterprise risks and sustainably closing security gaps
• Data privacy in an interconnected world: Customize your business expertise from the data you
generate to create a secure stakeholder ecosystem
• Security strategies meet digital transformation: How to adapt your know-how to a changing
business model and create standardized approaches to security breaches
• Bringing Security to the cloud: Which effort do you need to undertake to secure your cloud
operations?
www.securityofthingsworldusa.com
Good opportunity to speak directly to other people
in the industry
Marc Bown, Fitbit
“www.securityofthingsworldusa.com
www.securityofthingsworldusa.com
THE EVENT AT A GLANCE
152
LEADING EXPERTS
80:20
BUYER : SELLER
80
COMPANIES
40
SPEAKERS
20
COUNTRIES
527
MEETINGS
PARTICIPANT PROFILE
INDUSTRY SPLIT THE COMMUNITYGEOGRAPHIC SPLITSIZE
19%
12%
10%
9%
9%
8%
7%
5%
5%
4%
4%
3%
3%
2%
Public &
Government
Software & IT
Services
Pharma &
Lifescience
Telcos
Consulting &
Services
Electronics &
Semiconductors
Manufacturing &
Engineering
Oil & Gas
Aerospace &
Defense
Automotive
Utilities
OtherRetail & Consumer Goods
46%
33%
21%
Manager /
Senior Manager
Head of /
Director
CXOs
90%
6%
4%
ROW
North America
EMEA
41%
11%7%
18%
9%
15%
> 100.000
< 1.000
1.001 - 5.0005.001 - 10.000
10.001
– 50.000
50.001 –
100.000
Finance &
Insurance
Very good cross-section of IoT aware
and concerned people.
Andrew Kling, Schneider Electric
“www.securityofthingsworldusa.com
TESTIMONIALS
www.securityofthingsworldusa.com
“The presenters were very engaging. The total collection of presentations represented a
very diverse set of topics.”
Kevin Moore, Denso Manufacturing
“Good overview to the various topics covered by the buzzword IoT.”
Rainer Rodler, ZF Friedrichshafen AG
“Superb organization, great interaction with very
knowledgeable people.”
Preetam Sirur, S&P Global
“Commonality in themes on the problem statements”
Sekhar Nagasundaram, Visa
“Good network, content, short and efficient timeline distribution, well organized,
icebreakers management/theme /space.”
Dawn Sheirzad, Macys
“Global nature and cross industry mix of the event was refreshing.”
Anahi Santiago, Christiana Care Health System
”Very informative and good networking.”
Taoheed Kassim, Maersk
“Very good chance to discuss and learn from others facing similar
challenges with securing IOT solutions.”
Eric Devoy, BP
“Educational and interesting”
Xiaobo Wang, Huawei
“Security of Things World USA 2016 was informative and relevant to a wide
range of industries and roles within those industries.”
Ken Wolf, Reynolds and Reynolds
“The conference was fantastic.”
Dr Pierre Boisrond, Aviall
“Very good cross-section of IoT aware and concerned people.”
Andrew Kling, Schneider Electric
“The speakers were engaging, the topics were relevant, and the attendees
were very knowledgeable.”
Barrett Richards, AutomatedLogic division of United Technologies
“Good opportunity to speak directly to other people in the industry”
Marc Bown, Fitbit
“Well run, great content”
Mark Ramsey, Assa Abloy
“Diverse audience and good insights in multiple verticals”
Earn Sandhaus, Cypress
“Great chance to hear from and discuss with some really bright people trying
to addresses the challenges of IoT security.”
Stuart Wagner, Enterprise Products Partners
“Interesting group of attendees, good talks!”
Adam Brand, Protiviti
Security of Things World USA 2016 was informative and
relevant to a wide range of industries and roles within those
industries.
Ken Wolf, Reynolds and Reynolds
Pierre Texier, SNCF“
www.securityofthingsworldusa.com
THE EVENT IN PICTURES
www.securityofthingsworldusa.com
www.2015.mes-production.we-conect.com
COMING UP IN 2017
www.securityofthingsworldusa.com
DEFINING SECURITY IN A CONNECTED WORLD
October 2017 | San Diego, USA
www.securityofthingsworldusa.com
www.2015.mes-production.we-conect.com
www.securityofthingsworld.com
UPCOMING EVENTS
www.securityofthingsworldusa.com
FEBRUARY 20-21, 2017 | SAN DIEGO | USA
www.industryofthingsworldusa.com
OCTOBER 2017 | SAN DIEGO | USA
www.deliveryofthingsworldusa.com
APRIL 24-25, 2017 | BERLIN | GERMANY
www.deliveryofthingsworld.com
JUNE 12-13, 2017 | BERLIN | GERMANY
www.securityofthingsworld.com
JULY 03-04, 2017 | SINGAPORE
www.industryofthingsworldasia.com
SEPTEMBER 18-19, 2017 | BERLIN| GERMANY
www.industryofthingsworld.com
JUNE 14-15, 2017 | BERLIN | GERMANY
autonomous-systems.tech
OCTOBER 2017 | SAN DIEGO| USA
www.securityofthingsworldusa.com
www.2015.mes-production.we-conect.com
www.securityofthingsworldusa.com
GET IN TOUCH!
Andreas Alexiou
Sales Director – you.CONECT
+49 (0)30 52 10 70 3 – 60
andreas.alexiou@you-conect.com
Géraud de Dieleveult
Director Partner Management - you.CONECT
+49 (0)30 52 10 70 3 – 86
geraud.de-dieuleveult@you-conect.com
TO SPONSOR TO SPEAK TO ATTEND
Maria Relaki
Portfolio Director – you.CONECT
+49 (0)30 52 10 70 3 – 43
maria.relaki@you-conect.com
www.2015.mes-production.we-conect.com
POST-EVENT REPORT

More Related Content

What's hot

Final file fastest growing companies of 2020
Final file  fastest growing companies of 2020Final file  fastest growing companies of 2020
Final file fastest growing companies of 2020Mirror Review
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty VisualizationDoug Cogswell
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Reportaccenture
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020Ray Bugg
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Kevin Duffey
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Ray Bugg
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Born to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformationBorn to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformationEY
 
EY Digital Deal Economy - Nederland
EY Digital Deal Economy - NederlandEY Digital Deal Economy - Nederland
EY Digital Deal Economy - Nederlandreichske
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Andrea Mennillo
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 

What's hot (20)

Final file fastest growing companies of 2020
Final file  fastest growing companies of 2020Final file  fastest growing companies of 2020
Final file fastest growing companies of 2020
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Born to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformationBorn to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformation
 
EY Digital Deal Economy - Nederland
EY Digital Deal Economy - NederlandEY Digital Deal Economy - Nederland
EY Digital Deal Economy - Nederland
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 

Similar to Security of Things World USA 2016 - Post Event Report

The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfCIO Look Magazine
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryWilliam Beer
 
India's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfinsightssuccess2
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
10 Most Influential Business Leaders in Cyber Security  April 2022.pdf10 Most Influential Business Leaders in Cyber Security  April 2022.pdf
10 Most Influential Business Leaders in Cyber Security April 2022.pdfinsightssuccess2
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 

Similar to Security of Things World USA 2016 - Post Event Report (20)

The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
India's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdfIndia's Leading Cyber Security Companies to Watch.pdf
India's Leading Cyber Security Companies to Watch.pdf
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
10 Most Influential Business Leaders in Cyber Security  April 2022.pdf10 Most Influential Business Leaders in Cyber Security  April 2022.pdf
10 Most Influential Business Leaders in Cyber Security April 2022.pdf
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
b-ciodigest_apr13.en-us
b-ciodigest_apr13.en-usb-ciodigest_apr13.en-us
b-ciodigest_apr13.en-us
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 

More from Ramona Kohrs

DTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportDTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportRamona Kohrs
 
Smart Automotive Variant.Con 2016 - Post Event Report
Smart Automotive Variant.Con 2016 - Post Event ReportSmart Automotive Variant.Con 2016 - Post Event Report
Smart Automotive Variant.Con 2016 - Post Event ReportRamona Kohrs
 
MES & Process Minds 2016 - Post Event Report
MES & Process Minds 2016 - Post Event ReportMES & Process Minds 2016 - Post Event Report
MES & Process Minds 2016 - Post Event ReportRamona Kohrs
 
CiMi.CON Evolution 2016 - Post Event Report
CiMi.CON Evolution 2016 - Post Event ReportCiMi.CON Evolution 2016 - Post Event Report
CiMi.CON Evolution 2016 - Post Event ReportRamona Kohrs
 
DTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportDTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportRamona Kohrs
 
TRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
TRACKTS! 2016 –Smart.Serialization, Track & Trace MindsTRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
TRACKTS! 2016 –Smart.Serialization, Track & Trace MindsRamona Kohrs
 
Software Defined Everything 2016 - Post Event Report
Software Defined Everything 2016 - Post Event ReportSoftware Defined Everything 2016 - Post Event Report
Software Defined Everything 2016 - Post Event ReportRamona Kohrs
 
Social Business Collaboration - Post Event Report
Social Business Collaboration - Post Event ReportSocial Business Collaboration - Post Event Report
Social Business Collaboration - Post Event ReportRamona Kohrs
 
Rethink! SPMS 2016 - Post Event Report
Rethink! SPMS 2016 - Post Event ReportRethink! SPMS 2016 - Post Event Report
Rethink! SPMS 2016 - Post Event ReportRamona Kohrs
 
Rethink! MAD Minds 2016 - Post Event Report
Rethink! MAD Minds 2016 - Post Event ReportRethink! MAD Minds 2016 - Post Event Report
Rethink! MAD Minds 2016 - Post Event ReportRamona Kohrs
 
Rethink! ITIS 2016 - Post Event Report
Rethink! ITIS 2016 - Post Event ReportRethink! ITIS 2016 - Post Event Report
Rethink! ITIS 2016 - Post Event ReportRamona Kohrs
 
Rethink! ITEM 2016 - Post Event Report
Rethink! ITEM 2016 - Post Event ReportRethink! ITEM 2016 - Post Event Report
Rethink! ITEM 2016 - Post Event ReportRamona Kohrs
 
Rethink! HR & Technology Minds 2016
Rethink! HR & Technology Minds 2016Rethink! HR & Technology Minds 2016
Rethink! HR & Technology Minds 2016Ramona Kohrs
 
Rethink! Corporate Finance Minds 2016
Rethink! Corporate Finance Minds 2016Rethink! Corporate Finance Minds 2016
Rethink! Corporate Finance Minds 2016Ramona Kohrs
 
Rethink! Connected Customer 360° - Post Event Report
Rethink! Connected Customer 360° - Post Event ReportRethink! Connected Customer 360° - Post Event Report
Rethink! Connected Customer 360° - Post Event ReportRamona Kohrs
 
Corporate Governance Compliance Strategies - Post Event Report
Corporate Governance Compliance Strategies - Post Event ReportCorporate Governance Compliance Strategies - Post Event Report
Corporate Governance Compliance Strategies - Post Event ReportRamona Kohrs
 
Virtual Workplace Evolution 2016 - Post Event Report
Virtual Workplace Evolution 2016 - Post Event ReportVirtual Workplace Evolution 2016 - Post Event Report
Virtual Workplace Evolution 2016 - Post Event ReportRamona Kohrs
 
Smart Variant CON 2016
Smart Variant CON 2016Smart Variant CON 2016
Smart Variant CON 2016Ramona Kohrs
 

More from Ramona Kohrs (20)

DTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportDTIM 2016 - Post Event Report
DTIM 2016 - Post Event Report
 
Smart Automotive Variant.Con 2016 - Post Event Report
Smart Automotive Variant.Con 2016 - Post Event ReportSmart Automotive Variant.Con 2016 - Post Event Report
Smart Automotive Variant.Con 2016 - Post Event Report
 
MES & Process Minds 2016 - Post Event Report
MES & Process Minds 2016 - Post Event ReportMES & Process Minds 2016 - Post Event Report
MES & Process Minds 2016 - Post Event Report
 
CiMi.CON Evolution 2016 - Post Event Report
CiMi.CON Evolution 2016 - Post Event ReportCiMi.CON Evolution 2016 - Post Event Report
CiMi.CON Evolution 2016 - Post Event Report
 
DTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportDTIM 2016 - Post Event Report
DTIM 2016 - Post Event Report
 
TRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
TRACKTS! 2016 –Smart.Serialization, Track & Trace MindsTRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
TRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
 
Software Defined Everything 2016 - Post Event Report
Software Defined Everything 2016 - Post Event ReportSoftware Defined Everything 2016 - Post Event Report
Software Defined Everything 2016 - Post Event Report
 
Social Business Collaboration - Post Event Report
Social Business Collaboration - Post Event ReportSocial Business Collaboration - Post Event Report
Social Business Collaboration - Post Event Report
 
SAMS Europe 2016
SAMS Europe 2016SAMS Europe 2016
SAMS Europe 2016
 
Rethink! SPMS 2016 - Post Event Report
Rethink! SPMS 2016 - Post Event ReportRethink! SPMS 2016 - Post Event Report
Rethink! SPMS 2016 - Post Event Report
 
Rethink! MAD Minds 2016 - Post Event Report
Rethink! MAD Minds 2016 - Post Event ReportRethink! MAD Minds 2016 - Post Event Report
Rethink! MAD Minds 2016 - Post Event Report
 
Rethink! ITIS 2016 - Post Event Report
Rethink! ITIS 2016 - Post Event ReportRethink! ITIS 2016 - Post Event Report
Rethink! ITIS 2016 - Post Event Report
 
Rethink! ITEM 2016 - Post Event Report
Rethink! ITEM 2016 - Post Event ReportRethink! ITEM 2016 - Post Event Report
Rethink! ITEM 2016 - Post Event Report
 
Rethink! HR & Technology Minds 2016
Rethink! HR & Technology Minds 2016Rethink! HR & Technology Minds 2016
Rethink! HR & Technology Minds 2016
 
Rethink! Corporate Finance Minds 2016
Rethink! Corporate Finance Minds 2016Rethink! Corporate Finance Minds 2016
Rethink! Corporate Finance Minds 2016
 
Rethink! Connected Customer 360° - Post Event Report
Rethink! Connected Customer 360° - Post Event ReportRethink! Connected Customer 360° - Post Event Report
Rethink! Connected Customer 360° - Post Event Report
 
Corporate Governance Compliance Strategies - Post Event Report
Corporate Governance Compliance Strategies - Post Event ReportCorporate Governance Compliance Strategies - Post Event Report
Corporate Governance Compliance Strategies - Post Event Report
 
Virtual Workplace Evolution 2016 - Post Event Report
Virtual Workplace Evolution 2016 - Post Event ReportVirtual Workplace Evolution 2016 - Post Event Report
Virtual Workplace Evolution 2016 - Post Event Report
 
Smart Variant CON 2016
Smart Variant CON 2016Smart Variant CON 2016
Smart Variant CON 2016
 
SAMS 2016
SAMS 2016SAMS 2016
SAMS 2016
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

Security of Things World USA 2016 - Post Event Report

  • 2. OVERVIEW www.securityofthingsworldusa.com Security of Things World USA took place on Nov 3-4 in San Diego, CA and was a huge success. Security experts from all major business and industrial sectors met up to discuss and define the most important issues when it comes to security and the Internet of Things. We had the pleasure of welcoming a variety of very interesting expert speakers ranging from the CISO of the FBI, Arlette Hart, talking about building security into the next generation of things to Larry Clinton (CEO of ISA) sharing his cybersecurity scenario 2020 and 40 other great talks. Security by design One thing became clear: Connected things are amongst us and will prevail even further in business and daily life. We cannot afford to leave security to be an after-thought. Security needs to move into the center of business and design strategies to ensure the safety and privacy of businesses and individuals. Every company has different requirements but through the right partnerships, standards, innovation and an open mind for the possibilities this new era of technologies is opening up IoT security can be fully optimized. Security of Things World USA is coming back in 2017 with the latest case studies and approaches on how security is impacting the connected world. Don’t miss the only strategic IoT Security event in the States. For more information go to: www.securityofthingsworldusa.com
  • 3. Superb organization, great interaction with very knowledgeable people. Preetam Sirur, S&P Global “www.securityofthingsworldusa.com
  • 4. KEYNOTES www.securityofthingsworldusa.com Larry Clinton CEO Internet Security Alliance KEYNOTE: A global Cybersecurity Scenario 2020: The impact of Digital Business on Security Nick Yoo Chief Security Architect McKesson KEYNOTE: Healthcare IoT Security Challenges Jay Radcliffe Senior Security Researcher Rapid 7 KEYNOTE: The Hacker will see you now: a skeptical look at connected medical devices Darek Kominek Senior Product Marketing Manager OPC Foundation KEYNOTE: Changing the game Cyber-Security vs. Dynamic Cyber-Incident Response John Mattison Chief Medical Information Officer Kaiser Permanente KEYNOTE: How to create value of Security of IoT Arlette Hart CISO FBI KEYNOTE: Building Security into the Next Generation of Things Christine Kringer Director of the National Security Division‘s Outreach Program for the Protection of National Assets Department of Justice KEYNOTE: Combatting National Security Cyber Risks Posed by the Internet of Things Dr. Howard Shrobe Director of Cybersecurity CSAIL KEYNOTE: Cyber Threats and the Internet of Things Emily Heath CISO AECOM PANEL DISCUSSION: Changing CISO perspective Anahi Santiago CISO Christiana Care Health System PANEL DISCUSSION: Changing CISO perspective David Pollino Deputy CISO Bank of the West PANEL DISCUSSION: Changing CISO perspective Gary Hayslip Deputy Director, CISO, Department of Information Technology City of San Diego PANEL DISCUSSION: Changing CISO perspective Austin Scott SCADA Information Security Engineer San Diego Gas and Electric PANEL DISCUSSION: Identifying & resolving potential threats across all systems and infrastructure Britt Talbert Former Senior Program Manager, Information Security General Motors PANEL DISCUSSION: Identifying & resolving potential threats across all systems and infrastructure Find out more about the Security of Things World USA speaker panel here: http://securityofthingsworldusa.com/en/speakers/
  • 5. SPEAKERS www.autonomous-driving-berlin.comwww.securityofthingsworldusa.com Robert Richardson Editorial Director TechTarget's Security Media Group Jeff O'Neil Manager, IT Audit and Compliance Dignity Health Sekhar Nagasundaram Senior Director, Information Security Visa Inc Francis Melemedjian Chief Technology Officer P2link Vinay Gandhi Senior Manager IT Compliance & Risk Energy Future Holdings / Txu Energy Marc Bown Senior Security Engineer Fitbit Inc Preetam Sirur Senior Director S&P Dow Jones Indices Thomas Doheny IT Risk Officer Federal Reserve Bank of New York Dawn Sheirzad Product Manager, Cyber Security Macy's Mark Ramsey Chief Information Security Officer ASSA ABLOY Group Tristan Petak Cyber Security Executive Darktrace Dr Pierre Boisrond Information Security Engineering Team Lead Aviall Benjamin Collar Head of Research Group, Cyber-Security Siemens Rainer Rodler Project Manager of Product IT Security ZF Friedrichshafen AG Dr Michaela Iorga Senior Security Technical Lead for Cloud Computing NIST Brad Burkle Senior Account Executive Venafi Andrew Kling Director Cyber Security and Architecture Schneider Electric Cherie Dawson Global Cyber Product Leader AIG Commercial Insurance Jason Bareiszis Cyber Security Incident Response Manager Tetra Tech Stuart Wagner Director, Information Technology Security and Compliance Enterprise Products Partners L.P. Sasha Biskup Information Security Director Fitbit Inc Adam Brand Core-Member I am The Cavalry Jared Carstensen CISO CRH Find out more about the Security of Things World USA speaker panel here: http://securityofthingsworldusa.com/en/speakers/
  • 6. Very informative and good networking. Taoheed Kassim, Maersk “www.securityofthingsworldusa.com
  • 7. www.securityofthingsworldusa.com BUSINESS PARTNERS 2016 FIND OUT MORE ABOUT OUR PARTNERSHIP OPPORTUNITIES
  • 8. www.securityofthingsworldusa.com MEDIA PARTNERS 2016 PRIMARY MEDIA PARTNERS MEDIA PARTNERS SUPPORTING ASSOCIATIONS
  • 9. Very good chance to discuss and learn from others facing similar challenges with securing IOT solutions. Eric Devoy, BP “ www.securityofthingsworldusa.com
  • 10. ATTENDING COMPANIES AECOM, AIG Commercial Insurance, ASSA ABLOY Group, Automated Logic Corporation, Aviall, Avira Romania, Bank of the West, Bayshore Networks, Certified Security Solutions, CGI Federal, Christiana Care Health System, City of San Diego, CRH, CSAIL, CVS Healthcare, Cypress Semiconductor Corporation, Darktrace, DENSO International, Department Of The Navy, Dignity Health, Eaton Corporation, Energy Future Holdings, Enterprise Products Partners, EPB, FBI, Federal Reserve Bank of New York, First Tech Federal Credit Union, First technology federal credit union, Fitbit, Fortegra, General Motors, HID Global, Honeywell, Huawei, I am The Cavalry, Iden Trust, INC Research, Inlet, Internet Security Alliance, Kaiser Permanente, Kentucky Retirement Systems, Laureate International Universities, Macy's, Maersk Line, Matrikon, Matthews Asia, McKesson, Mondelez International, NASA, Network World , NIST, Ozone International, P2link, Paulson & Co, Philips, Qualcomm, R.A Jones, Rapid 7, Reynolds, S&P Dow Jones Indices, San Diego Gas & Electric, San Diego Unified Port District, SapientNitro, Schneider Electric, Securitas, Siemens, Sierra Wireless, St. Jude Medical, Subex, TechTarget's Security Media Group , Tetra Tech, The Norfolk & Dedham Group, The Reynolds and Reynolds Company, Time Warner Cable, TrustInSoft, TRW Automotive, U.S. Department of Justice, UL, US Department of Defense, US Department of Homeland Security, Van Eck Associates, Vectrus, Venafi, Vidder, Visa, Wells Fargo & Company, Women in Security, Yokogawa, Zezez.com, ZF Friedrichshafen, ZingBox www.securityofthingsworldusa.com
  • 11. KEY TOPICS 2016 • Securing your cyber physical systems by bridging them with innovation: How can you assure that the Security of your IoT business becomes one of your most valued assets? • Expanding your IT Security in a digitalized world: Leverage your existing system security experience and move towards a more complex approach by implementing intelligence led operations • Business Continuity Management: Prepare your business for the unknown by anticipating enterprise risks and sustainably closing security gaps • Data privacy in an interconnected world: Customize your business expertise from the data you generate to create a secure stakeholder ecosystem • Security strategies meet digital transformation: How to adapt your know-how to a changing business model and create standardized approaches to security breaches • Bringing Security to the cloud: Which effort do you need to undertake to secure your cloud operations? www.securityofthingsworldusa.com
  • 12. Good opportunity to speak directly to other people in the industry Marc Bown, Fitbit “www.securityofthingsworldusa.com
  • 13. www.securityofthingsworldusa.com THE EVENT AT A GLANCE 152 LEADING EXPERTS 80:20 BUYER : SELLER 80 COMPANIES 40 SPEAKERS 20 COUNTRIES 527 MEETINGS
  • 14. PARTICIPANT PROFILE INDUSTRY SPLIT THE COMMUNITYGEOGRAPHIC SPLITSIZE 19% 12% 10% 9% 9% 8% 7% 5% 5% 4% 4% 3% 3% 2% Public & Government Software & IT Services Pharma & Lifescience Telcos Consulting & Services Electronics & Semiconductors Manufacturing & Engineering Oil & Gas Aerospace & Defense Automotive Utilities OtherRetail & Consumer Goods 46% 33% 21% Manager / Senior Manager Head of / Director CXOs 90% 6% 4% ROW North America EMEA 41% 11%7% 18% 9% 15% > 100.000 < 1.000 1.001 - 5.0005.001 - 10.000 10.001 – 50.000 50.001 – 100.000 Finance & Insurance
  • 15. Very good cross-section of IoT aware and concerned people. Andrew Kling, Schneider Electric “www.securityofthingsworldusa.com
  • 16. TESTIMONIALS www.securityofthingsworldusa.com “The presenters were very engaging. The total collection of presentations represented a very diverse set of topics.” Kevin Moore, Denso Manufacturing “Good overview to the various topics covered by the buzzword IoT.” Rainer Rodler, ZF Friedrichshafen AG “Superb organization, great interaction with very knowledgeable people.” Preetam Sirur, S&P Global “Commonality in themes on the problem statements” Sekhar Nagasundaram, Visa “Good network, content, short and efficient timeline distribution, well organized, icebreakers management/theme /space.” Dawn Sheirzad, Macys “Global nature and cross industry mix of the event was refreshing.” Anahi Santiago, Christiana Care Health System ”Very informative and good networking.” Taoheed Kassim, Maersk “Very good chance to discuss and learn from others facing similar challenges with securing IOT solutions.” Eric Devoy, BP “Educational and interesting” Xiaobo Wang, Huawei “Security of Things World USA 2016 was informative and relevant to a wide range of industries and roles within those industries.” Ken Wolf, Reynolds and Reynolds “The conference was fantastic.” Dr Pierre Boisrond, Aviall “Very good cross-section of IoT aware and concerned people.” Andrew Kling, Schneider Electric “The speakers were engaging, the topics were relevant, and the attendees were very knowledgeable.” Barrett Richards, AutomatedLogic division of United Technologies “Good opportunity to speak directly to other people in the industry” Marc Bown, Fitbit “Well run, great content” Mark Ramsey, Assa Abloy “Diverse audience and good insights in multiple verticals” Earn Sandhaus, Cypress “Great chance to hear from and discuss with some really bright people trying to addresses the challenges of IoT security.” Stuart Wagner, Enterprise Products Partners “Interesting group of attendees, good talks!” Adam Brand, Protiviti
  • 17. Security of Things World USA 2016 was informative and relevant to a wide range of industries and roles within those industries. Ken Wolf, Reynolds and Reynolds Pierre Texier, SNCF“ www.securityofthingsworldusa.com
  • 18. THE EVENT IN PICTURES www.securityofthingsworldusa.com
  • 19. www.2015.mes-production.we-conect.com COMING UP IN 2017 www.securityofthingsworldusa.com DEFINING SECURITY IN A CONNECTED WORLD October 2017 | San Diego, USA www.securityofthingsworldusa.com
  • 20. www.2015.mes-production.we-conect.com www.securityofthingsworld.com UPCOMING EVENTS www.securityofthingsworldusa.com FEBRUARY 20-21, 2017 | SAN DIEGO | USA www.industryofthingsworldusa.com OCTOBER 2017 | SAN DIEGO | USA www.deliveryofthingsworldusa.com APRIL 24-25, 2017 | BERLIN | GERMANY www.deliveryofthingsworld.com JUNE 12-13, 2017 | BERLIN | GERMANY www.securityofthingsworld.com JULY 03-04, 2017 | SINGAPORE www.industryofthingsworldasia.com SEPTEMBER 18-19, 2017 | BERLIN| GERMANY www.industryofthingsworld.com JUNE 14-15, 2017 | BERLIN | GERMANY autonomous-systems.tech OCTOBER 2017 | SAN DIEGO| USA www.securityofthingsworldusa.com
  • 21. www.2015.mes-production.we-conect.com www.securityofthingsworldusa.com GET IN TOUCH! Andreas Alexiou Sales Director – you.CONECT +49 (0)30 52 10 70 3 – 60 andreas.alexiou@you-conect.com Géraud de Dieleveult Director Partner Management - you.CONECT +49 (0)30 52 10 70 3 – 86 geraud.de-dieuleveult@you-conect.com TO SPONSOR TO SPEAK TO ATTEND Maria Relaki Portfolio Director – you.CONECT +49 (0)30 52 10 70 3 – 43 maria.relaki@you-conect.com