BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:PUBLISH X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VEVENT CLASS:PUBLIC CREATED:20181030T162749Z DESCRIPTION:Securing the connected future – The end-to-end IoT Security e vent │ July 01 - 02\, 2019 │ Maritim proArte Hotel Berlin\, Germany \n \nSecurity of Things World Key T opics\n· Implementation of Security by Design: How to design your software and strategy from the ground to minimise impact when a security vulnerability or an invalid user is discovered.\n· Rethinking the technology strategy for scalable\, secure and efficient IoT: Addressing s ecurity throughout the smart\, connected product lifecycle\, from the init ial design to the operational environment\, your network and ecosystem.\n · Securing your cyber physical systems by bridging them with inno vation and integration into your product development\n· Bringing security to the Cloud: How can the cloud be a secure platform for you? Wha t options are available? What is needed to maintain cloud security?\n· IoT security and crossroads to privacy\, governance and GDPR\n· Blockchain and how blockchain can create IoT security\n· Sec urity & interoperability: Standardisation\, risk assesment and vulnerablit y scan?\n· Expanding and shifting industry boundaries: How old te chnologies and IoT technologies are effecting and changing security needs. \n· IoT Crisis Response: Secure your conected devices and prepare your business for the unknown by anticipating enterprise risks and sustai nably closing security gaps.\n· Safeguarding enterprise data and data privacy in an interconnected world: Ensure safe authentification and tailor your proposition to respond to the security concerns that preoccupy enterprise customers today.\n· Critical Infrastructure: How can infrastructure and devices be better secured to protect against potential security hacks and what you need to be aware of.\n· Security of I ndustrial Control Systems: What are the security challenges and how to app roach cyber security in ICS?\n \nSpeaker Panel: https://www.securityofthin gsworld.com/speakers \n \nWhat can you expect? https://www.securityofthing sworld.com/who-why \n \nHow to attend? https://www.securityofthingsworld.c om/book-now \n \n DTEND;VALUE=DATE:20190703 DTSTAMP:20141103T104907Z DTSTART;VALUE=DATE:20190701 LAST-MODIFIED:20181030T162749Z LOCATION:Maritim proArte Berlin PRIORITY:5 SEQUENCE:0 SUMMARY;LANGUAGE=de:Security of Things World 2019 TRANSP:TRANSPARENT UID:040000008200E00074C5B7101A82E0080000000000CB56E15BF7CF01000000000000000 010000000234E2456F5409C4986A2CDCF43EAB912 X-ALT-DESC;FMTTYPE=text/html:

Securing the connected future – The end-to-end IoT Security event │\; July 01 - 02\, 2019 │\; Maritim proArte Hotel Berlin\, Germany

 \;

Security of Things World Key Topics

· \; \; \; \;& nbsp\; \; \; \; Implementation of Security by Design: How to design your software and strategy from< /span> the ground to minimise impact when a sec urity vulnerability or an invalid user is discovered.

· \; \; \; \;  \; \; \; \; Rethinking the te chnology strategy for< /span> scalable\, secure and efficient IoT: Addressing security throughout the smart\, connected product lifecycle\, from the initial design to the operational environment\, your network and ecosystem< /span>.

· \; \; \; \; \; \; \; \; Securing your cyber physic al systems by < span class=SpellE>bridging them with innovation and integration in to your product development

·< span style='font:7.0pt "Times New Roman"'> \; \; \; \;&nbs p\; \; \; \; Bringing security to< /span> the Cloud: How can the cloud be a secure platform for < span class=SpellE>you? What options are avai lable? What is needed to maintain cloud security?

< span style='font-family:Symbol\;mso-fareast-font-family:Symbol\;mso-bidi-f ont-family:Symbol'>· \; \; \; \; \; \; \;  \; IoT security and crossroads to privacy< /span>\, governance and GDPR

· \; \; \; \; \; \; \; \; Blockchain and how blockcha in can create < span class=SpellE>IoT security

· \;  \; \; \; \; \; \; \; Security &\; interoperability: Standar disation\, risk assesment and vulnerablity < span class=SpellE>scan?

· \; \; \; \; \;  \; \; \; Expandi ng and shifting industry boundaries: How old technologies and IoT technologies are effecting and changing security needs.

· \; \; \; \; \; \;&n bsp\; \; IoT Crisis Response: Secure your< /span> conected devices and prepare your business for the unknown by anticipating enterprise risks and sustainably closing security gaps.

· \; \; \; \; \; \; \; \; Safeguarding enterprise data and data priv acy in an interconnected world: Ensure safe< /span> authentification and tailor your proposition to respond to the security concerns that preoccupy enterprise customers today.

· \; \; \; \; \; \;  \; \; Critical Infrastructure: How can infrastructure and d evices be better secured to protect against potential security hacks and what you need to be aware of< /span>.

· \; \; \; \; \; \; \; \; Security of Industrial Control Systems: What are the security challenges and how to approach cyber security in ICS?

 \;

Speaker Panel: https://www.securityofthingsworld.com/speakers

 \;

What can you expect? https://www.securityofthingsworld.com/who-wh y

 \;

How to attend? https://www.securityofthingsworld.com/book-now

 \;

X-MICROSOFT-CDO-BUSYSTATUS:FREE X-MICROSOFT-CDO-IMPORTANCE:1 X-MICROSOFT-DISALLOW-COUNTER:FALSE X-MS-OLK-AUTOFILLLOCATION:FALSE X-MS-OLK-CONFTYPE:0 BEGIN:VALARM TRIGGER:-PT1080M ACTION:DISPLAY DESCRIPTION:Reminder END:VALARM END:VEVENT END:VCALENDAR