際際滷shows by User: tomkat58 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: tomkat58 / Sat, 15 Aug 2020 14:15:20 GMT 際際滷Share feed for 際際滷shows by User: tomkat58 Identity Based Lifecycle Management for a Trusted IoT Supply Chain /slideshow/identity-based-lifecycle-management-for-a-trusted-iot-supply-chain/237936347 iotdevicesecuritysummit2018katsioulas-200815141520
Can we trust IoT devices containing components from multiple vendors in the supply chain? Attacks like Mirai botnet traced to Xionmai cameras and the Big Hack traced to the spy chip on Supermicro boards revealed that the roots of many security problems lie in the structure of the electronics supply chain. Component suppliers are paid to deliver hardware for a set price often use subcontractors which may compromise security and trust. System integrators bear the burden for delivering trusted IoT devices, but only a few have the infrastructure to trace, onboard and provision such devices on a mass basis, or to gather the analytics needed to uncover quality and security issues. What is needed in the IoT value chain is a trusted chip-to-device identity infrastructure linked to IoT cloud platforms which can provide economic incentives to deliver trusted hardware services throughout the life of IoT devices. And this identity-based lifecycle management from chip to cloud can enable a trusted IoT supply chain. ]]>

Can we trust IoT devices containing components from multiple vendors in the supply chain? Attacks like Mirai botnet traced to Xionmai cameras and the Big Hack traced to the spy chip on Supermicro boards revealed that the roots of many security problems lie in the structure of the electronics supply chain. Component suppliers are paid to deliver hardware for a set price often use subcontractors which may compromise security and trust. System integrators bear the burden for delivering trusted IoT devices, but only a few have the infrastructure to trace, onboard and provision such devices on a mass basis, or to gather the analytics needed to uncover quality and security issues. What is needed in the IoT value chain is a trusted chip-to-device identity infrastructure linked to IoT cloud platforms which can provide economic incentives to deliver trusted hardware services throughout the life of IoT devices. And this identity-based lifecycle management from chip to cloud can enable a trusted IoT supply chain. ]]>
Sat, 15 Aug 2020 14:15:20 GMT /slideshow/identity-based-lifecycle-management-for-a-trusted-iot-supply-chain/237936347 tomkat58@slideshare.net(tomkat58) Identity Based Lifecycle Management for a Trusted IoT Supply Chain tomkat58 Can we trust IoT devices containing components from multiple vendors in the supply chain? Attacks like Mirai botnet traced to Xionmai cameras and the Big Hack traced to the spy chip on Supermicro boards revealed that the roots of many security problems lie in the structure of the electronics supply chain. Component suppliers are paid to deliver hardware for a set price often use subcontractors which may compromise security and trust. System integrators bear the burden for delivering trusted IoT devices, but only a few have the infrastructure to trace, onboard and provision such devices on a mass basis, or to gather the analytics needed to uncover quality and security issues. What is needed in the IoT value chain is a trusted chip-to-device identity infrastructure linked to IoT cloud platforms which can provide economic incentives to deliver trusted hardware services throughout the life of IoT devices. And this identity-based lifecycle management from chip to cloud can enable a trusted IoT supply chain. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iotdevicesecuritysummit2018katsioulas-200815141520-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Can we trust IoT devices containing components from multiple vendors in the supply chain? Attacks like Mirai botnet traced to Xionmai cameras and the Big Hack traced to the spy chip on Supermicro boards revealed that the roots of many security problems lie in the structure of the electronics supply chain. Component suppliers are paid to deliver hardware for a set price often use subcontractors which may compromise security and trust. System integrators bear the burden for delivering trusted IoT devices, but only a few have the infrastructure to trace, onboard and provision such devices on a mass basis, or to gather the analytics needed to uncover quality and security issues. What is needed in the IoT value chain is a trusted chip-to-device identity infrastructure linked to IoT cloud platforms which can provide economic incentives to deliver trusted hardware services throughout the life of IoT devices. And this identity-based lifecycle management from chip to cloud can enable a trusted IoT supply chain.
Identity Based Lifecycle Management for a Trusted IoT Supply Chain from tomkat58
]]>
270 0 https://cdn.slidesharecdn.com/ss_thumbnails/iotdevicesecuritysummit2018katsioulas-200815141520-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png