Speaker: Mr. Christopher Jones
Chris Jones is Crypto Quantique’s Principal IoT Security Specialist. Following a 28-year career in project management and field applications engineering at BAE Systems, Cypress Semiconductor and Renesas Electronics,
Chris spent two years as a Senior Application Engineer at Secure ThingZ, Inc, in Cambridge, UK, working in IoT security. He joined Crypto Quantique in May 2020. Chris holds a BSc in Electrical and Electronic Engineering from the University of Coventry, UK.
Subject: Securing IoT devices at scale 即將引爆! 物聯網安全改變全人類說明
Abstract:
Cybersecurity is becoming a critical issue as our lives are increasingly mediated by digital devices and cloud servers.
The Internet of Things (IoT) sector recognizes the importance of cybersecurity to our wellbeing, and to its growth, and so has started developing security standards, testing, and accreditation strategies to address it.
Regulators around the world are also stepping up their game, developing and enacting legislation that holds IoT developers and ecosystem operators to account for the impact of the systems they implement, with sometimes draconian penalties for security failures.
One of the key challenges for companies developing IoT chips and devices, and creating IoT ecosystems with them, is to ensure their security when implemented at a massive scale.
While a tabletop demo with a handful of devices may show that an IoT security strategy is valid, implementing that strategy at scale demands skills and tools that many organizations have yet to acquire. At the heart of the issue is the complexity involved in finding a way to securely create, distribute, and manage the unique identities and cryptographic keys necessary to protect IoT chips, devices, and ecosystems.
The good news is that hardware and software solutions are emerging to make it easier for designers who are not security specialists to apply cutting-edge security technology and strategies to their IoT ecosystems now, and to manage them over the long term.
The presentation will discuss the following: What is the root of cyber security? Explanation of identity and trust and its importance. The creation of a unique identifier and how it must be provable. Current solutions : key injection (costs, complexity), pre-provisioned secure elements and secure enclaves.
The value of a physical unclonable function The problem of cloud service provider enrolment Certificate provisioning Solving the problem : How to onboard at scale using QuarkLink security platform. - Intended Attendees: IoT product developers, engineers interested in implementing security - Marketing Material: QuarkLink | The universal IoT security platform | Crypto Quantique
Target Audience: IOT, Chip Maker, OEM