16 Conference Report #techonomy16

Can The Internet of Things be Secured?

1/1

  • Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016.  (Photo by Paul Sakuma Photography) www.paulsakuma.com

    Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016. (Photo by Paul Sakuma Photography) www.paulsakuma.com

  • Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016.  (Photo by Paul Sakuma Photography) www.paulsakuma.com

    Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016. (Photo by Paul Sakuma Photography) www.paulsakuma.com

  • Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016.  (Photo by Paul Sakuma Photography) www.paulsakuma.com

    Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016. (Photo by Paul Sakuma Photography) www.paulsakuma.com

  • Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016.  (Photo by Paul Sakuma Photography) www.paulsakuma.com

    Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016. (Photo by Paul Sakuma Photography) www.paulsakuma.com

  • Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016.  (Photo by Paul Sakuma Photography) www.paulsakuma.com

    Techonomy16 conference in Half Moon Bay, California, Thursday, November 10, 2016. (Photo by Paul Sakuma Photography) www.paulsakuma.com

Panelists

Mark Bartolomeo
Vice President, Connected Solutions - Internet of Things, Verizon

Betsy Cooper
Executive Director, UC Berkeley Center for Long-Term Cybersecurity

Nicole Eagan
Chief Executive Officer, Darktrace

Chris Rill
Founder and CTO, Canary

Moderator

Stacey Higginbotham
Journalist, The Internet of Things Podcast


When the entire internet can grind nearly to a halt because IoT devices have been harnessed for a denial of service attack, we have a problem. As we move to secure the vast network of connected devices, what are the biggest threats? As humans increasingly work in symbiotic relationships with powerful machines, how do we define security? Should our digital identity be connected to the “things” around us?

Tags: , , , ,