Securing Industry 4.0
Facebook X LinkedIn

Securing Industry 4.0

Combined Session
Friday, May 13, 2022 10:30—11:30
Location: B07-08

Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security! IAM-related experiences from the automobile and home appliances sector.

A lot of innovation around physical products is created by connectivity, allowing them to become part of the consumer's larger digital ecosystem and the providing enterprise. Gartner says in its megatrends for the next decade: "Anything costing more than a few USD will be "intelligent" and networked." Examples are electronic wall boxes to charge cars or remote control for dishwashers, cars, etc.
Several compelling use cases require smart things to act not only for themselves but also on behalf of the end-user. OpenID Connect and OAuth 2.0 can be used to provide a user-friendly and secure user journey. But how trustworthy is a connected device at the edge? Learn about the experiences with these standards when it is about IoT and how Identity&Access Management solutions help reduce time-to-market, costs, and inconsistency between different touchpoints.
Key learnings:
- What are the design paradigms to build IAM for IoT?
- How does IoT fit into a Zero Trust Architecture?
- What are the essential protocols to bring identity and IoT together?
- How to build an IoT showcase by leveraging low-code platforms?
- What are the challenges, best practices, and pitfalls of a IAM for IoT projects?

Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!
Event Recording
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!
Click here to watch the recording of this session. You'll need to log in to watch it.
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security! IAM-related experiences from the automobile and home appliances sector.
Presentation deck
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security! IAM-related experiences from the automobile and home appliances sector.
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Andre Priebe
Andre Priebe
iC Consult Group GmbH
Andre Priebe serves as the Chief Technology Officer at iC Consult Group, a vendor-independent system integrator specializing in Identity & Access Management, with a global team of over 800...

Cyber-Securing the Digital Industry

Living in a hyperconnected world where we can change color of the product we ordered until a moment before it dives into the color bath requires manufacturers to open their Operational Technology (OT) to the internet and expose it more than ever to cyber attacks. If machines, production lines or heating and cooling systems become targets, the potential damage can be existential. 

As the way we look at cybersecurity within our IT world is very different to the requirements within the OT world, an integrated IT/OT Security Strategy has to combine traditional and sometimes legacy approaches with future oriented, often AI-driven solutions to secure humans, things, processes and supply chains throughout the whole techhnology stack.

In this session, we will create a blueprint of topics you will need to take care about to secure your hyperconnected enterprise.

Cyber-Securing the Digital Industry
Event Recording
Cyber-Securing the Digital Industry
Click here to watch the recording of this session. You'll need to log in to watch it.
Cyber-Securing the Digital Industry
Presentation deck
Cyber-Securing the Digital Industry
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Graham Williamson
Graham Williamson
KuppingerCole
Graham Williamson is a senior Analyst at KuppingerCole. Graham has practical experience in the identity management and access control industry having completed assignments in the academic,...
Subscribe for updates
Please provide your email address