SlideShare a Scribd company logo
1 of 13
Download to read offline
Q-loud
Ein Unternehmen der QSC Gruppe
Build & Run
Applying Security as a Service to IoT
October 2016
Accelerating Digital Leadership
Christian J. Pereira
Q-loud 2
Q-loud
Cyber Threat in IoT
Enterprise IT
+ Devices
+ Connectivity
+ Platform / Portal
+ Mobile Device
+ Application
… open for additional threat vectors
3
Q-loud
Threats to expect
All known (and unknown) attacks
• Viruses / Worms
• Replay
• MIM
• DDoS
• Ransomware
• …
4
Q-loud 5
Q-loud
Attackers to expect
6
Hacktivism
Sabotage Criminals
Spys
Q-loud 7
Q-loud
Security as a Service
Security as a Service is an existing offer
- Networks
- Data Center
- Websites
Managed Security System
Security Operation Center
8
Q-loud
IoT protection
Big Data Analytics,
User-Application,
Physical Thing Integration / Hardware Provisioning Application / Analytics
868 MHz
AES encryption
Q-loud
Gateway
868 MHz AES network/https
Q-loud
Summary IoT security
Expect IoT security to be a challenge
Use security standards available … BUT …
Add encryption as most as you can
Identity @ manufacturing
If it‘s not your core competency – buy services!
10
Q-loud
Q-loud “Full Stack” digital excellence
Concept/Consulting
Integration
Hardware Development
Hardware Production
Standardized Hardware
Eco-System (Hardware/Analytics)
Software Development
11
Platform Operations
Secure Connectivity
Q-loud
Q-loud – combined IoT competences of QSC-group
12
Q-loud
Q-loud
Christian J. Pereira
General Manager
Q-loud GmbH
Mathias-Brüggen-Str. 55
50829 Köln
Deutschland
Christian.Pereira@qsc.de
+49 171 3306333
www.q-loud.de

More Related Content

What's hot

Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITREMITRE - ATT&CKcon
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Controls Mapping; Mike Long, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Controls Mapping; Mike Long, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Controls Mapping; Mike Long, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Controls Mapping; Mike Long, MITREMITRE - ATT&CKcon
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website Blockchain Council
 
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco connect winnipeg 2018   accelerating incident response in organizations...Cisco connect winnipeg 2018   accelerating incident response in organizations...
Cisco connect winnipeg 2018 accelerating incident response in organizations...Cisco Canada
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE - ATT&CKcon
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki NetworkCollaborators
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsSBWebinars
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud SecurityLora O'Haver
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention ApproachesCipherCloud
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...Cisco Canada
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - MagnifierJisc
 

What's hot (20)

Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - TRAM; Jackie Lasky and Sarah Yoder, MITRE
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Controls Mapping; Mike Long, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Controls Mapping; Mike Long, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - Controls Mapping; Mike Long, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - Controls Mapping; Mike Long, MITRE
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website
 
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco connect winnipeg 2018   accelerating incident response in organizations...Cisco connect winnipeg 2018   accelerating incident response in organizations...
Cisco connect winnipeg 2018 accelerating incident response in organizations...
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - Magnifier
 

Viewers also liked

Is today’s Information Technology smart enough for a Smart World?
Is today’s Information Technology smart enough for a Smart World?Is today’s Information Technology smart enough for a Smart World?
Is today’s Information Technology smart enough for a Smart World?M2M Alliance e.V.
 
Connected cars: making navigation personal, adding telematics features and en...
Connected cars: making navigation personal, adding telematics features and en...Connected cars: making navigation personal, adding telematics features and en...
Connected cars: making navigation personal, adding telematics features and en...M2M Alliance e.V.
 
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerThe Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerM2M Alliance e.V.
 
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...M2M Alliance e.V.
 
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...M2M Alliance e.V.
 
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHIT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHM2M Alliance e.V.
 
Connectivity for a better world
Connectivity for a better worldConnectivity for a better world
Connectivity for a better worldM2M Alliance e.V.
 
IoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessIoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessM2M Alliance e.V.
 
Tackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTTackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTM2M Alliance e.V.
 
Effective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesEffective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesM2M Alliance e.V.
 

Viewers also liked (14)

Is today’s Information Technology smart enough for a Smart World?
Is today’s Information Technology smart enough for a Smart World?Is today’s Information Technology smart enough for a Smart World?
Is today’s Information Technology smart enough for a Smart World?
 
Connected cars: making navigation personal, adding telematics features and en...
Connected cars: making navigation personal, adding telematics features and en...Connected cars: making navigation personal, adding telematics features and en...
Connected cars: making navigation personal, adding telematics features and en...
 
From Vision to Reality
From Vision to RealityFrom Vision to Reality
From Vision to Reality
 
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerThe Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
 
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
 
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
 
Autonomous driving
Autonomous driving Autonomous driving
Autonomous driving
 
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHIT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
 
Connectivity for a better world
Connectivity for a better worldConnectivity for a better world
Connectivity for a better world
 
IoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessIoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do business
 
Tackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTTackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoT
 
IoT - THE NEW NORMAL?
IoT - THE NEW NORMAL?IoT - THE NEW NORMAL?
IoT - THE NEW NORMAL?
 
Standardization for M2M
Standardization for M2MStandardization for M2M
Standardization for M2M
 
Effective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesEffective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sources
 

Similar to Accelerating Digital Leadership

Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Building Secure IoT solutions with Red Hat
Building Secure IoT solutions with Red HatBuilding Secure IoT solutions with Red Hat
Building Secure IoT solutions with Red HatIshu Verma
 
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Amazon Web Services
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Floyd DCosta
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseChristiaan Beek
 
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...Univention GmbH
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
 
Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Guido Schmutz
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityAPNIC
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 
Brochure_english_final.pdf
Brochure_english_final.pdfBrochure_english_final.pdf
Brochure_english_final.pdfssuser949453
 
Brochure_english_final(Low).pdf
Brochure_english_final(Low).pdfBrochure_english_final(Low).pdf
Brochure_english_final(Low).pdfssuser949453
 

Similar to Accelerating Digital Leadership (20)

Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
Information Security
Information SecurityInformation Security
Information Security
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Building Secure IoT solutions with Red Hat
Building Secure IoT solutions with Red HatBuilding Secure IoT solutions with Red Hat
Building Secure IoT solutions with Red Hat
 
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
Enabling Innovative Business Opportunities Through Secure Cloud Adoption - Se...
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
 
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
Sichere Anmeldung im UCS Netzwerk – Multifaktor Authentisierung mit RCDevs Op...
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
Brochure_english_final.pdf
Brochure_english_final.pdfBrochure_english_final.pdf
Brochure_english_final.pdf
 
Brochure_english_final(Low).pdf
Brochure_english_final(Low).pdfBrochure_english_final(Low).pdf
Brochure_english_final(Low).pdf
 

More from M2M Alliance e.V.

Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0M2M Alliance e.V.
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - OverviewM2M Alliance e.V.
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentM2M Alliance e.V.
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...M2M Alliance e.V.
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System M2M Alliance e.V.
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsM2M Alliance e.V.
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business AdvantageM2M Alliance e.V.
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserM2M Alliance e.V.
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology M2M Alliance e.V.
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingM2M Alliance e.V.
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living M2M Alliance e.V.
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation M2M Alliance e.V.
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...M2M Alliance e.V.
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsM2M Alliance e.V.
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesM2M Alliance e.V.
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteM2M Alliance e.V.
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthM2M Alliance e.V.
 

More from M2M Alliance e.V. (20)

M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
 
Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - Overview
 
VR Industry Solutions
VR Industry Solutions VR Industry Solutions
VR Industry Solutions
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M Environment
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory Applications
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business Advantage
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA Teaser
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device Hacking
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of Things
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future Revenues
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from Remote
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential Growth
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Accelerating Digital Leadership