BIO

Radix Skurla, Michael_.png

Michael Skurla  | Chief Product Officer | Radix IoT

Officer, Skurla set product strategy for the company’s IoT platform. He has over two decades of experience in control automation and IoT product design with Fortune 500 companies, focusing on the intersection of software and hardware that emphasizes data aggregation and analytics for mission-critical industries. As a well-recognized thought leader and a contributor to such top industry publications as Field Technologies, Network World, Critical Facilities, Oilman Magazine, IoT Playbook, IoT News, Digitalisation World (UK), LD+A, among others, he is a frequent lecturer on outcome-based analytics and consolidated data methodologies for building and industrial applications to drive efficiency and alternative business outcomes through data. Skurla is a contributing member of ASHRAE, USGBC, and IES Education.

Abstract

The IoT InfoSec Conundrum

The Internet of Things (IoT) is a rapidly growing mix of hardware, firmware, cloud services, and, in some cases, dreams that have vast economic and societal significance worldwide. In the end, IoT theoretically brings together what was disjointed to allow for such outcomes as insight, automation, and AI, and ML. Though these outcomes are in debatable states of maturity; yet the irreversible course is that intercommunity of hardware and data are driving a new world.

IoT hardware, by nature, drives small purpose-built telemetry devices that focus on a task. Yet they are often deployed in a mass with other IoT hardware (often by lots of vendors) with cloud services responsible for detailing with the end goals of all this data. This has led to an untenable mix of problems that traditional I.T. security was not completely prepared for; and onslaught of untrusted network capable computing devices winding up part of what was previously a highly curated security expectation. 

This seminar strives to explain and offer answers to this growing security concern for manufacturers, software platforms, and end users alike so they can invest with clarity as they look to adapt to this new norm. 

Learning Objectives:

  • Clarify the definition of an IoT solution in contrast to what people and even manufacturers often claim, exposing the clear economic purpose that drives the desire to pursue such a solution.

  • Understand the history of IoT security and how we got to where we are now, underscoring the risks at stake, but the benefits of IoT that can’t roll back. 

  • Describe the fundamental differences of the attack surface of IoT vs traditional I.T. and understand the layers of security that must exist to not hinder the promise of IoT. 

  • Define the fundamental best practices from a manufacturers’ perspective and a customer’s perspective to illuminate the best possible outcomes of desires versus risk.

Recall and state the current attempts at various government intervention in this emerging field and steps being attempted to legislate solutions versus market-based solutions and their pros and cons.