Secure IoT Best Practice – Session 3
Getting the latest insights and updates to IoT cybersecurity best practice is a staple for the annual conference and this year is no different with 3 dedicated sessions.
These sessions are intended for developers and practitioners who design, operate or use IoT applications. Stand on the shoulders of giants and get insights from product design, system architecture and supply chain management.
Host
Paul Kearney
Cybersecurity Expert
Paul Kearney has recently retired from the position of Professor of Cybersecurity at Birmingham City University. Previously, he worked in R&D roles for British Aerospace, Sharp Laboratories of Europe, and British Telecommunications. He retains an active interest in cybersecurity research, undertaking freelance consultancy, contributing to activities of the IoT Security Foundation, acting as an expert evaluator and reviewer for research programmes and serving on the advisory boards of research projects. He holds a BSc from the University of Liverpool and a PhD from the University of Durham, both in theoretical physics and is a Full Member of the Chartered Institute of Information Security.
Speakers
Scott Register
VP, Security Solutions, Keysight
Scott Register has more than 15 years of experience leading product management and go-to-market activities for global technology companies and is currently Vice President for Security Solutions for Keysight.
Xander Heemskerk
Director Product Security, Royal Philips
Xander Heemskerk is the Director Product Security – Personal Health, Digital Pathology & Brand Licensing in the Product and Services Security Office (PSSO) at Philips. In this role he drives the Product Security programs and initiatives for Medical Devices, in vitro diagnostics (IVDs) and Wellness solutions worldwide.
Dr Carolina Adaros
Product Security Expert, Bosch Security Systems
Dr. Carolina Adaros is an electronics engineer, MSc in analytics and risk management, and PhD in cybersecurity. At Bosch she is the proxy of the Product Security Officer, maintains product security processes/policies, internal consultancy & training and incident response processes.