IoT Grand Slam 2023 Headline Keynote – Don’t Lend Them Your Things

Session Abstract:

The preponderance of “things” (the “T” in the IoT) has resulted mass vulnerabilities to cyber threats. Threat actors launch millions of attack events per second, and continue to achieve their nefarious objectives via data locking, denial of service, ransomeware, and scareware. Join Dr. Tom Bradicich, as he outlines the different types of hackers, their various objectives, modes of attack, and incident response approaches. He’ll be joined by his special guest, who will share some best practices to counter cyber threats and improve cyber safety throughout the home, on the road, and at work

Speakers:

Dr. Tom Bradicich, Chairman of the IoT Community Board of Advisors, began his career at IBM, where he was an IBM Fellow, R&D VP, Distinguish Engineer, and Server CTO. At National Instruments, an Operational Technologies (OT) company, he served as an NI Fellow and company officer, pioneering Big Analog Data™ solutions.

While at HP and Hewlett Packard Enterprise (HPE), Tom held various roles including R&D VP, HPE Fellow, Global Head of Edge & IoT Software Labs, and General Manager, As GM, he lead the global business unit, Servers and Edge Systems and Software, with P&L, worldwide sales, R&D, and customer experience ownership. Opening three global Innovation Labs, and exceeding salsas quotes by achieving revenue growth of over $250M, Tom’s business unit was the fastest growing in HPE.

Tom and his team developed and launched dozens of systems and software products, such as advanced as-a-Service (aaS) software for cloud managed remote infrastructure, edge-as-a-service, and converged IT/Operational Technologies (OT). And the creation of several new product categories such as notebook computers, smartphones (IBM Simon™), Converged Systems (IBM BladeCenter™), Converged Edge Systems & Sofware (HPE Edgeline™), and OT and edge management software and platforms (HPE OTLink). Tom’s teams designed and launched the first 64 bit enterprise ARM server, the first x86 server with on-chip graphics, and IBM’s first prototype notebook computer. He incepted and directed the HPE Channel-to-Edge Institute partner program, and led company-wide strategies and venture/M&A assessments, and led HPE’s first corporate IoT & edge strategy.

Tom is named in CRN’s Top 100 Executives and Top 25 Disrupters for three years, inducted into the NC State University Alumni Hall of Fame, received the IBM Chairman’s Award, and elected to the IBM Academy of Technology. He served on the Board of Directors of Aspen Technology (AZPN), a publicly traded Industrial AI software company, the Board of Advisors of SparkCognition, an AI software company, and the Board of Advisors and Diversity Committee, University of Florida. Tom holds several US patents, and founded the charity sockrelief.com, providing socks to the homeless and children in need.

Chad Humphries is a Network & Security Consultant for Rockwell Automation.  He has 20 years of experience with operational technologies used in automated manufacturing environments (OT-IACS).  He specializes in strategic business planning areas such as:  digital sustainability, reporting, privacy law, cybersecurity law, compliance, production network security standards (NIST-CSF, IEC-62443, and ISO), grant subsidy capture, and Rockwell Automation network technologies/deliverables. His core competency is helping organizations to quantify and identify risk, as well as outline a strategic OT network plan that aligns with industry recognized best practices.  

Key Takeaways:

You don’t have to lock down a Data Center & get ransomware to do damage. They can control the filtration and purity of a water system. You can control the Electrical Grid if you get there through these things.
Why are things so vulnerable?
Preponderance- so many of them (fourteen billion devices)
Proficiency- these things are getting smarter
Peculiarity- they are somewhat unfamiliar by IT and Cyber experts
We have a lot of people who are experts in CSN vulnerabilities but not necessarily the OT IoT world. Tom Bradicich, PhD

Main Cyber Threat Targets
1. IT Systems & Operations
2. People
3. Operational Technology Systems & Line of Business Operations
The Industrial IoT is an increasing focus for threat actors- e.g controlling Things!
Digital Sustainability
Being able to preserve or process something at a certain rate or level. Sustainability is a multi-faceted conversation but for this talk let us focus on what is digitally sustainable. In the manufacturing world we have a lot of security gaps we have a lot of work to do. Chad Humphries Rockwell Automation.

Sustainability is enforced through environmental social governance. What assurance can we provide to the communities we serve? In the manufacturing world we commonly say that when it comes to cyber incidents and cyber crime unlike the business enterprise world- in the manufacturing world the outcomes are health safety and environmental including loss of life!

Data Trends to Consider
-Governance
-Disclosure
-Risk management strategy
Chad Humphries