EIC is asking for IDoT presentation(s)
Dear All, We were ask to present at the European Identity Conference (5.5. until 9.5.) in Munich. This could be a presentation or a panel or both. So if you have topics or ideas to present please let me know. We can talk about it in our next conf call on Friday. Best Ingo
Ingo, One thought I had would be to present an update to the presentation I gave last year in which I described some of the risks and threats of the IoT. This could be done as a solo presentation or a panel. Given EICC's preference for panels that might be best. I have become increasingly concerned about the potential to create global chaos by systematically compromising large numbers of IoT devices. This could be done by either a criminal organization or a nation state. I have attached the presentation for reference. Jeff On Thu, Jan 29, 2015 at 4:11 PM, <Ingo.Friese@telekom.de> wrote:
Dear All,
We were ask to present at the European Identity Conference (5.5. until 9.5.) in Munich.
This could be a presentation or a panel or both.
So if you have topics or ideas to present please let me know.
We can talk about it in our next conf call on Friday.
Best Ingo
_______________________________________________ DG-IDoT mailing list DG-IDoT@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/dg-idot
-- Jeff Stollman stollman.j@gmail.com 1 202.683.8699 Truth never triumphs — its opponents just die out. Science advances one funeral at a time. Max Planck
Yea, I can see why that might appeal to them Jeff.It plays in quite well with the Governance Risk Compliance overall theme that EIC is famous for..CheersColin Date: Thu, 29 Jan 2015 17:49:30 +0530 From: stollman.j@gmail.com To: Ingo.Friese@telekom.de CC: dg-idot@kantarainitiative.org Subject: Re: [DG-IDoT] EIC is asking for IDoT presentation(s) Ingo, One thought I had would be to present an update to the presentation I gave last year in which I described some of the risks and threats of the IoT. This could be done as a solo presentation or a panel. Given EICC's preference for panels that might be best. I have become increasingly concerned about the potential to create global chaos by systematically compromising large numbers of IoT devices. This could be done by either a criminal organization or a nation state. I have attached the presentation for reference. Jeff On Thu, Jan 29, 2015 at 4:11 PM, <Ingo.Friese@telekom.de> wrote: Dear All, We were ask to present at the European Identity Conference (5.5. until 9.5.) in Munich.This could be a presentation or a panel or both. So if you have topics or ideas to present please let me know.We can talk about it in our next conf call on Friday. Best Ingo _______________________________________________ DG-IDoT mailing list DG-IDoT@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/dg-idot -- Jeff Stollman stollman.j@gmail.com 1 202.683.8699 Truth never triumphs — its opponents just die out.Science advances one funeral at a time. Max Planck _______________________________________________ DG-IDoT mailing list DG-IDoT@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/dg-idot
Good stuff. On a panel as counter point (not that I can get to EIC) we could show how using OAuth, Connect, UMA and TLS as examples of modern protocols you could properly do device authentication to control the things in your home. And by show I mean demonstrate it using low cost hardware, leveraging open source, known home hardware and security devices. The counter point is that we don't have to keep doing it in ways that rightfully provokes people to point out how insecure most networked things are. Could also talk about some of the interop stuff around security devices in general. From: dg-idot-bounces@kantarainitiative.org [mailto:dg-idot-bounces@kantarainitiative.org] On Behalf Of Colin Wallis Sent: Thursday, January 29, 2015 7:35 PM To: Jeff Stollman; Ingo.Friese@telekom.de Cc: dg-idot@kantarainitiative.org Subject: Re: [DG-IDoT] EIC is asking for IDoT presentation(s) Yea, I can see why that might appeal to them Jeff. It plays in quite well with the Governance Risk Compliance overall theme that EIC is famous for.. Cheers Colin _____ Date: Thu, 29 Jan 2015 17:49:30 +0530 From: stollman.j@gmail.com To: Ingo.Friese@telekom.de CC: dg-idot@kantarainitiative.org Subject: Re: [DG-IDoT] EIC is asking for IDoT presentation(s) Ingo, One thought I had would be to present an update to the presentation I gave last year in which I described some of the risks and threats of the IoT. This could be done as a solo presentation or a panel. Given EICC's preference for panels that might be best. I have become increasingly concerned about the potential to create global chaos by systematically compromising large numbers of IoT devices. This could be done by either a criminal organization or a nation state. I have attached the presentation for reference. Jeff On Thu, Jan 29, 2015 at 4:11 PM, <Ingo.Friese@telekom.de> wrote: Dear All, We were ask to present at the European Identity Conference (5.5. until 9.5.) in Munich. This could be a presentation or a panel or both. So if you have topics or ideas to present please let me know. We can talk about it in our next conf call on Friday. Best Ingo _______________________________________________ DG-IDoT mailing list DG-IDoT@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/dg-idot -- Jeff Stollman stollman.j@gmail.com 1 202.683.8699 Truth never triumphs - its opponents just die out. Science advances one funeral at a time. Max Planck _______________________________________________ DG-IDoT mailing list DG-IDoT@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/dg-idot
participants (4)
-
Colin Wallis
-
Ingo.Friese@telekom.de
-
j stollman
-
Salvatore D'Agostino