Connected Devices Summit
Virtual Summit December 8 - 9, 2022
ISMG, the leading media provider to the cybersecurity community, has shown its commitment to education and networking through its series of Global Summits over the last nine years. Our Connected Devices Summit brings leaders and key decision-makers together to connect and learn from each other’s success, as well as challenges, in an interactive educational environment to better combat fraud.

The Connected Devices Summit agenda is designed with a goal of providing actionable education implement back at the office immediately. This year's agenda will cover medical device security, growing cybersecurity issues associated with enterprise IoT, the growing attack surface, modernizing IT and OT and more. As you plan for the coming year, navigate the latest stage in the pandemic, and pivot for unexpected vulnerabilities and ever-changing threat landscape, please join us on August 16th and 17th for the Connected Devices Summit!
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Yasser Rasheed
Global Director of Enterprise Client Sales, Intel
Intel Corp
Denny Prvu
Director of Identity & Access Management: Enterprise Security
RBC
Rob Suarez
CISO
Becton Dickinson
Rob Suárez is a cybersecurity and privacy professional in the medical device and healthcare IT industry. At BD, Rob serves as Chief Information Security Officer and oversees cybersecurity across the company’s enterprise, IT and manufacturing systems. Rob currently chairs the...
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Tom Field
Senior Vice President of Editorial
ISMG
Aseem Jakhar
Co-Founder -Director Research and Developent
Payatu
Aseem Jakhar is the Co-Founder/Director, R&D at Payatu https://payatu.com a research-powered cyber security services company specialized in IoT, Embedded, cloud, mobile and infrastructure security. He is the founder of null-The open security community, a registered not-for-profit organization and one of...
Farid Bichareh
CTO
AASA Inc. - 01LightComm
He began his professional career as an Electrical Control Engineer designing automated and integrated systems, robotic solutions, and optical rotary encoders (Visible Light Communication enabled sensors). Over the past 20 years, he has worked as adjunct professor, technical and research...
Lisa Tuttle
CISO
SPX Corporation
Kevin Fu
Associate Professor, IEEE Fellow, Dr. Dwight E. Harken Memorial Lecturer Founder of the Archimedes Center for Healthcare and Device Security
University of Michigan
Anna Delaney
Director of Productions
ISMG
Brad Ree
CTO
ioXt
Brad Ree is chief technology officer of ioXt. In this role, he leads ioXt’s security products supporting the ioXt Alliance. Brad holds over 25 patents and is the former security advisor chair for Zigbee. He has developed communication systems for...
Keith O'Sullivan
SVP. IT Risk & Chief Information Security Officer
Standard Industries
O'Sullivan is currently the CISO and senior vice president of IT risk at Standard Industries, where he developed a sophisticated information security strategy for Standard and its operating companies. As CISO, his security leadership supports innovative DevSecOps models, threat-focused offensive...
Thad Phillips
CISO
Baptist Health
Phillips has more than 20 years of experience in healthcare IT security. He is enterprise CISO at Baptist Health Care, which includes three hospitals, four medical parks, a behavioral health network and an institute for orthopedics and sports medicine. He...
Lana DeMaria
Director, Data Privacy
Alaska Airlines
Lana is a motivated and results-oriented leader with international experience (deploying impactful programs, landing global projects, and establishing connections with brilliant people in the US, Russia, India, Canada, Ireland, South Africa, Singapore, Argentina, Egypt, Czech Republic). Lana is experienced in...
View Agenda
How is Mobile Phone Fraud Evolving - and What Can We Do About It?

An acceleration in the pace of digital transformation has undoubtedly seen many consumers adopting mobile banking. However, criminals have also adapted to this new environment and have accordingly evolved their tactics in the form of increasingly sophisticated and targeted account takeover attacks. So how can we improve our detection and mitigation techniques to thwart fraudsters and protect consumers?

This expert panel will share insights and strategies, including:

  • How the past two-plus COVID years have changed the face of fraud;
  • The evolution of unauthorised mobile porting, SIM swapping and account takeover fraud;
  • How the industry can adopt stronger authentication methods such as FIDO.
  • 09:00 AM
  • 09:29 AM
State of IoT Security 2022

IoT technologies that are carefully aligned with business use cases enable process optimization, enhanced product offerings, and can transform customer and employee experiences. However, use of IoT technologies leads to heightened risk for the organization. However, many orgs continue to struggle with immature security offerings that fail to securing IoT deployments. and can lead to physical danger, data loss, and breach of consumer privacy. This session will outlines the state of IoT security in 2022, and provide best practices that orgs can follow to minimize IoT security related risks.

  • 09:30 AM
  • 09:59 AM
Kevin Fu on the State of Medical Device Security

Scientist, educator, government official. Kevin Fu is a pioneer in the battle to achieve medical device cybersecurity, and he has played multiple roles. From his current position within the FDA, Fu discusses the state of medical device security, including:

  • Archaic engineering principals
  • Threat modeling
  • Education and awareness
  • 10:00 AM
  • 10:29 AM
IoT Security - The Good, The Bad and The Ugly
Aseem Jakhar, Co-Founder -Director Research and Developent, Payatu

New technologies have been a boon to all industries specifically in cost and efficiency optimization. Organizations have been incorporating new tech over the years. While the CISOs have been busy managing and securing IT assets, this new tech is slipping in unnoticed. Today an organization's infrastructure not only includes traditional machines but a host of other interesting and small devices or things. It is a smorgasbord for attackers to pick and choose the weakest links to get and stay inside an organization. On the other hand, the defenders have no insights into the new attack surface. Join me as we discuss the journey of a security professional over the changing times, what lies ahead and how to start taking action now.

Aseem Jakhar
  • 10:30 AM
  • 10:59 AM
IoXT: Creating a Consortium of Best Practices
Brad Ree, CTO, ioXt

The IoXT Alliance is an industry group that has come together to help solve three major challenges for connected devices: Security, Upgradability and Transparency. In this exclusive session, Brad Ree, CTO of the Alliance, shares insights on:

  • The state of connected device security
  • Where the cybersecurity needle is moving forward
  • How global regulations are taking shape
Brad Ree
  • 11:00 AM
  • 11:29 AM
Exhibit & Networking Break
  • 11:30 AM
  • 11:59 AM
Building Sustainable IoT using the Seven Properties of Highly Secure Devices

By 2025, researchers predict that we will have 41.6 billion connected devices in play. That’s a lot of real estate to protect. In this session, veteran cybersecurity expert Diana Kelley examines the risk inherent in these vulnerable devices, and she shares her vision of how to secure them via seven principles of an IoT security maturity model.

  • 12:00 PM
  • 12:29 PM
Medical Device Cybersecurity: The Latest Challenges
Rob Suarez, CISO, Becton Dickinson

What’s the status of FDA’s latest guidance and other efforts to help strengthen the cybersecurity of medical devices – especially amid the surge in COVID-19 remote patient monitoring and shortages of certain critical medical equipment? How are medical device makers implementing better security controls and best practices, and what are healthcare delivery organizations doing to keep their patients and data safe from the latest threats facing devices? Our panel will discuss these issues, plus:

  • The ongoing challenges involving legacy devices issues and outdated third-party software;
  • Vulnerability disclosures and patching;
  • Third-party components and a “Cybersecurity Bill of Materials”;
  • What the SolarWinds attack and connected medical devices have in common.
Rob Suarez
  • 12:30 PM
  • 12:59 PM
All Devices Small & Great: Risks and Remediation
Farid Bichareh, CTO, AASA Inc. - 01LightComm

From baby monitors to printers to tablets and automobiles, home branch offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable.

Join this expert panel for a discussion about understanding and remediating the risks from connected devices, including:

  • Designed for safety vs. security
  • Unintended consequences 
  • How to architect systems to secure these devices
Farid Bichareh
  • 01:00 PM
  • 01:29 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, August 17th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

ISMG, the leading media provider to the cybersecurity community, has shown its commitment to education and networking through its series of Global Summits over the last nine years. Our Connected Devices Summit brings leaders and key decision-makers together to connect and learn from each other’s success, as well as challenges, in an interactive educational environment to better combat fraud.

The Connected Devices Summit agenda is designed with a goal of providing actionable education implement back at the office immediately. This year's agenda will cover medical device security, growing cybersecurity issues associated with enterprise IoT, the growing attack surface, modernizing IT and OT and more. As you plan for the coming year, navigate the latest stage in the pandemic, and pivot for unexpected vulnerabilities and ever-changing threat landscape, please join us on August 16th and 17th for the Connected Devices Summit!
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Yasser Rasheed
Global Director of Enterprise Client Sales, Intel
Intel Corp
Denny Prvu
Director of Identity & Access Management: Enterprise Security
RBC
Rob Suarez
CISO
Becton Dickinson
Rob Suárez is a cybersecurity and privacy professional in the medical device and healthcare IT industry. At BD, Rob serves as Chief Information Security Officer and oversees cybersecurity across the company’s enterprise, IT and manufacturing systems. Rob currently chairs the...
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Tom Field
Senior Vice President of Editorial
ISMG
Aseem Jakhar
Co-Founder -Director Research and Developent
Payatu
Aseem Jakhar is the Co-Founder/Director, R&D at Payatu https://payatu.com a research-powered cyber security services company specialized in IoT, Embedded, cloud, mobile and infrastructure security. He is the founder of null-The open security community, a registered not-for-profit organization and one of...
Farid Bichareh
CTO
AASA Inc. - 01LightComm
He began his professional career as an Electrical Control Engineer designing automated and integrated systems, robotic solutions, and optical rotary encoders (Visible Light Communication enabled sensors). Over the past 20 years, he has worked as adjunct professor, technical and research...
Lisa Tuttle
CISO
SPX Corporation
Kevin Fu
Associate Professor, IEEE Fellow, Dr. Dwight E. Harken Memorial Lecturer Founder of the Archimedes Center for Healthcare and Device Security
University of Michigan
Anna Delaney
Director of Productions
ISMG
Brad Ree
CTO
ioXt
Brad Ree is chief technology officer of ioXt. In this role, he leads ioXt’s security products supporting the ioXt Alliance. Brad holds over 25 patents and is the former security advisor chair for Zigbee. He has developed communication systems for...
Keith O'Sullivan
SVP. IT Risk & Chief Information Security Officer
Standard Industries
O'Sullivan is currently the CISO and senior vice president of IT risk at Standard Industries, where he developed a sophisticated information security strategy for Standard and its operating companies. As CISO, his security leadership supports innovative DevSecOps models, threat-focused offensive...
Thad Phillips
CISO
Baptist Health
Phillips has more than 20 years of experience in healthcare IT security. He is enterprise CISO at Baptist Health Care, which includes three hospitals, four medical parks, a behavioral health network and an institute for orthopedics and sports medicine. He...
Lana DeMaria
Director, Data Privacy
Alaska Airlines
Lana is a motivated and results-oriented leader with international experience (deploying impactful programs, landing global projects, and establishing connections with brilliant people in the US, Russia, India, Canada, Ireland, South Africa, Singapore, Argentina, Egypt, Czech Republic). Lana is experienced in...

View Agenda
How is Mobile Phone Fraud Evolving - and What Can We Do About It?

An acceleration in the pace of digital transformation has undoubtedly seen many consumers adopting mobile banking. However, criminals have also adapted to this new environment and have accordingly evolved their tactics in the form of increasingly sophisticated and targeted account takeover attacks. So how can we improve our detection and mitigation techniques to thwart fraudsters and protect consumers?

This expert panel will share insights and strategies, including:

  • How the past two-plus COVID years have changed the face of fraud;
  • The evolution of unauthorised mobile porting, SIM swapping and account takeover fraud;
  • How the industry can adopt stronger authentication methods such as FIDO.
  • 09:00 AM
  • 09:29 AM
State of IoT Security 2022

IoT technologies that are carefully aligned with business use cases enable process optimization, enhanced product offerings, and can transform customer and employee experiences. However, use of IoT technologies leads to heightened risk for the organization. However, many orgs continue to struggle with immature security offerings that fail to securing IoT deployments. and can lead to physical danger, data loss, and breach of consumer privacy. This session will outlines the state of IoT security in 2022, and provide best practices that orgs can follow to minimize IoT security related risks.

  • 09:30 AM
  • 09:59 AM
Kevin Fu on the State of Medical Device Security

Scientist, educator, government official. Kevin Fu is a pioneer in the battle to achieve medical device cybersecurity, and he has played multiple roles. From his current position within the FDA, Fu discusses the state of medical device security, including:

  • Archaic engineering principals
  • Threat modeling
  • Education and awareness
  • 10:00 AM
  • 10:29 AM
IoT Security - The Good, The Bad and The Ugly
Aseem Jakhar, Co-Founder -Director Research and Developent, Payatu

New technologies have been a boon to all industries specifically in cost and efficiency optimization. Organizations have been incorporating new tech over the years. While the CISOs have been busy managing and securing IT assets, this new tech is slipping in unnoticed. Today an organization's infrastructure not only includes traditional machines but a host of other interesting and small devices or things. It is a smorgasbord for attackers to pick and choose the weakest links to get and stay inside an organization. On the other hand, the defenders have no insights into the new attack surface. Join me as we discuss the journey of a security professional over the changing times, what lies ahead and how to start taking action now.

Aseem Jakhar
  • 10:30 AM
  • 10:59 AM
IoXT: Creating a Consortium of Best Practices
Brad Ree, CTO, ioXt

The IoXT Alliance is an industry group that has come together to help solve three major challenges for connected devices: Security, Upgradability and Transparency. In this exclusive session, Brad Ree, CTO of the Alliance, shares insights on:

  • The state of connected device security
  • Where the cybersecurity needle is moving forward
  • How global regulations are taking shape
Brad Ree
  • 11:00 AM
  • 11:29 AM
Exhibit & Networking Break
  • 11:30 AM
  • 11:59 AM
Building Sustainable IoT using the Seven Properties of Highly Secure Devices

By 2025, researchers predict that we will have 41.6 billion connected devices in play. That’s a lot of real estate to protect. In this session, veteran cybersecurity expert Diana Kelley examines the risk inherent in these vulnerable devices, and she shares her vision of how to secure them via seven principles of an IoT security maturity model.

  • 12:00 PM
  • 12:29 PM
Medical Device Cybersecurity: The Latest Challenges
Rob Suarez, CISO, Becton Dickinson

What’s the status of FDA’s latest guidance and other efforts to help strengthen the cybersecurity of medical devices – especially amid the surge in COVID-19 remote patient monitoring and shortages of certain critical medical equipment? How are medical device makers implementing better security controls and best practices, and what are healthcare delivery organizations doing to keep their patients and data safe from the latest threats facing devices? Our panel will discuss these issues, plus:

  • The ongoing challenges involving legacy devices issues and outdated third-party software;
  • Vulnerability disclosures and patching;
  • Third-party components and a “Cybersecurity Bill of Materials”;
  • What the SolarWinds attack and connected medical devices have in common.
Rob Suarez
  • 12:30 PM
  • 12:59 PM
All Devices Small & Great: Risks and Remediation
Farid Bichareh, CTO, AASA Inc. - 01LightComm

From baby monitors to printers to tablets and automobiles, home branch offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable.

Join this expert panel for a discussion about understanding and remediating the risks from connected devices, including:

  • Designed for safety vs. security
  • Unintended consequences 
  • How to architect systems to secure these devices
Farid Bichareh
  • 01:00 PM
  • 01:29 PM
Day 2 Agenda

All content from Day 1 will be available on demand from 9 AM - 5 PM ET on Day 2, Wednesday, August 17th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.

  • 09:00 AM
  • 04:59 PM

Speaker Interviews

December 8 - 9, 2022

Connected Devices Summit