Information Technology veteran with 27 years of experience in areas of Programming, Security, Networking, Identity Management and Identity Relationship Management. I have worked for companies such as IBM, 3Com, Sun Microsystmes around the world. I have lived in different countries, such as Mexico, United Kingdom, Netherlands, Finland and Spain. Co-founder of ForgeRock (http://www.forgerock.com) a company based in San Francisco that powers the world's largest companies and government organizations with the most disruptive identity solutions.
Room: N-121 | Time: 11:10am - 11:30am
We have seen computers and phones been hacked and data been stolen. In the case of the IoT, the data might not be of high volume, but it is nevertheless critical. Think of somebody hacking your things to learn about the temperature patterns to deduce when home is alone, or remotely create condtiions to cause a fire, or somebody causing a car crash, or shuting down your peacemaker. How to identify the users to these devices, user an password? biometric, 2 factor? How do i know it is a legitimate and authorized user?
Learn about the technologies that can be used to identify and protect the devices participating in the Internet of Things.