View More
View Less
System Message
An unknown error has occurred and your request could not be completed. Please contact support.
Wait Listed
Personal Calendar
Conference Event
Times for this session to be announced soon
Conflict Found
This session is already scheduled at another time. Would you like to...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Replies ()
New Post
Microblog Thread
Post Reply
Your session timed out.
This web page is not optimized for viewing on a mobile device. Visit this site in a desktop browser to access the full set of features.
LiveWorx 2017

Beyond Security with Identity

Session Description

In today’s environment, we are accelerating the instrumentation of the physical world, connectivity, and the use of artificial intelligence to create outcomes previously not possible. In this world, there is an increasing need for trusted data - data integrity, rights management, privacy, …. and more. More specifically, there is a growing demand to attest relationships and hence the integrity of same in a way that enables us to create outcomes based on those relationships. This requires a change in paradigm for security …… the holy grail for security has always been the possibility of “integrating identity into the silicon” – it provides a tremendous advantage over the cyber adversaries and enables feature capabilities “up the stack” not possible with traditional approaches. This presentation will provide background into global drivers and insight into the emerging needs and possible approaches to meeting them.

Session Presenter
Additional Information
Smart Cities
The increasing demand for connectivity and instrumentation of the physical world to achieve new outcomes is driving new requirements.
As systems become less content centric and more connectivity centric it is more difficult to determine the system perimeter and control connections increasing complexity and vulnerabilities.
As these trends continue - architectures are becoming more complex - systems of systems that cross multiple boundaries. In this environment - the need for data integrity, data rights management, privacy, the ability to support micro/nano services, monetization of data, and others are becoming as prevalent as the need for security.
Breakout Session
45 minutes
Session Schedule