Thursday, June 27
5:00 - 5:25 pm
IAM of Things. Is that even a thing?
Smart objects invaded homes and offices yet their cybersecurity seems to have never be fully addressed and examples are legion where individual objects are too easily compromised, or whole objects fleets are misused, or personal data are compromised.
This session is about a methodology to address the security of IoT based on Identity, showing how applying Identity and Access Management recipes to the design of an IoT system can actually improve its level of cybersecurity:
-Many identities now interact in such systems: things themselves, consumers (owners, family members, bystanders, etc.), workforce end-users, remote maintainers (think of the mechanic of your connected vehicle), etc.
-Authenticating these identities is a fundamental and there are many ways to design how to embed identities within the objects
-Applying then the right authorizations at scale is a real challenge and must come after the various interactions between things and people have been carefully defined
-The whole lifecycle of objects should be considered, from design to trash
We want to share within this session several real-life situations (smart home, connected vehicle, etc.) of how you can design the identity of things and how to control accesses in various use-case throughout the lifecycle of your objects.