Hosted by IEEE
29 July 2014
2:00pm Eastern US
In this next installment we’ll explore the intersections of opportunity, legality, and interoperability as they relate to IoT.
Welcome to the world of hyper connectedness! It is predicted that in the near future users will have up to 5 active addressable devices and as many as 25 passive devices. At this rate, the connected ecosystem is poised to have over 200 billion active devices collecting and managing data by the year 2020. What does this all mean? It means that as the world continues to connect people, devices, and networks, many new opportunities arise -- opportunities of commerce, marketing, industry, mass production & farming, convenience, security, surveillance and more. In this next installment of the 2014 IEEE-SA Google+ Hangout Series on Privacy, we’ll explore the intersections of opportunity, legality, and interoperability as they relate to IoT.
And in a space as dynamic as the Internet of Things (IoT), questions are being considered that are both technical and policy driven in nature, including:
- What is the Internet of Things versus the Internet of Everything?
- How will data producing IoT change marketing and commerce? Are there information sharing or data privacy implications?
- What technical and policy standards exist in the space and what standards might need to be initiated to bring more value to participants while helping to assure reasonable user trust within systems?
- What types of access control should be in place to manage the masses of data the IoT generates?
- What special considerations need to be taken given that much of the data generated in a connected world may be associated to a person's identity or habits, what are the privacy and security implications of IoT, and how can data, collected by IoT / IoE devices and networks, be protected?
Salvatore D’Agostino - IDmachines LLC and Salvatore D’Agostino provide technology and services to identity, credentialing, access control, security, machine learning/analytics and technology transfer customers. Sal has 30 years of experience with large scale federated identity and security deployments in many cases involving the commercialization of new technologies. Sal’s customer and project experience includes EZPass and other electronic toll collection systems, many industrial control, SCADA and industrial automation applications, the United States Capitol and Pentagon physical security systems, the Personal Identity Verification credential infrastructure for the United States Federal government intelligence, defense and civilian agencies as well as identity, credential and access control infrastructure for global enterprises and governments.
Paul Madsen is a Principal Technical Architect within the Office of the CTO at Ping Identity. He has participated in various design, chairing, editing, and education roles for a number of identity standards, including OASIS SAML, the Simple Cloud Identity Management (SCIM), OAuth 2.0, and TV Everywhere. He holds an M.Sc. in Applied Mathematics and a Ph.D. in Theoretical Physics from Carleton University and the University of Western Ontario respectively.
Eva Maler drives innovation for the ForgeRock Open Identity Stack. She defines strategic product direction and oversees ForgeRock involvement in industry standards and emerging technologies related to access control, authorization, and privacy. Eve also engages with enterprise customers and prospects to drive innovative customer-centric Identity Relationship Management solutions focused on growing revenue and strengthening brand equity.
Moderated by Joni Brennan Joni has over a decade of service to the IEEE Standards Association (SA) and Industry Standards and Technology Organization (IEEE-ISTO) as a Senior Program Manager. Joni builds diplomatic and collaborative relationships within and across communities of interest. She has provided talks on Identity Federation and Privacy across the globe, including for .SE, Federal Weekly, and CA Luminaries (one of a select chosen industry speakers). She participates in international organizations and industry standards committees including: OECD ITAC, ISOC, IEEE, OASIS SSTC, ISO SC27 WG5, and ITU-T SG17 Q6. She has served as the NSTIC / IDESG Trust Framework WG Chair. She has provided testimony regarding Trusted Identity and Access Management systems for the US Office of National Coordinator (ONC) Health IT Security and Privacy (HITSP) committee as well.
She leads Kantara Initiative as the premiere Trust Framework Provider facing multiple industry sectors. As a US ICAM Trust Framework Provider Kantara Initiative will provide Accreditation and Approval verifications for Identity Providers / Credential Service Providers to be deemed qualified for access to connect to the US Federal Cloud Credential Exchange. In addition, working with multi-stakeholder representation, Joni has help to ensure that the Kantara Initiative program is aligned with OpenStand principles and referenced in multiple eGovernment strategies including: Government of Canada, New Zealand, and Sweden.