SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
www.2015.mes-production.we-conect.com
POST-EVENT REPORT
OVERVIEW
www.securityofthingsworld.com
Security of Things World 2016 was a huge success!
Over 220 international attendees came together in June in Berlin to discuss and define the future role
of security in the interconnected and smart world of the Internet of Things for businesses. We had the
honour to hear from European Government representatives (Federal Ministry of the Interior, Federal
Office for Information Security), from the most innovative real world case studies on how Security is
challenging businesses and from the leading solution providers in the field (GE Digital, HPE, IBM,
Microsoft and many more). With all major verticals represented, Security of Things World is the event
in the centre of where connections are made, news are announced and the Security of IoT community
comes together to define future security strategies.
What does the future hold for Security in the Internet of Things context?
The consensus was: communicate more and share knowledge. We, as a community, need to come
together, create partnerships and work on projects that will allow us to identify how security
technologies can be effectively applied to change the way business is done. We cannot afford to see
security as an afterthought. It needs to be part of strategies and design from the beginning.
Partnerships, security, standards, innovation and an open mind for the possibilities this new era of
technologies is opening up are key to take full advantage of IoT Security.
Security of Things World is coming back, bigger and better in 2017 to bring you once again the most
thought-provoking and leading experts in the field, making this an event not to be missed. Join us
again next year for the chance to be part of the elite group of experts shaping the future of Security.
For more information go to: www.securityofthingsworld.com
Interesting learnings and benchmarking of
security strategies in the real world
Andreas Maack, Merck KGaA
www.securityofthingsworld.com
“
KEYNOTES
www.securityofthingsworld.com
SPEAKERS
www.autonomous-driving-berlin.comwww.securityofthingsworld.com
SPEAKERS
www.securityofthingsworld.com
An excellent opportunity to talk & network with engaged
and enthusiastic colleagues
Ross Tsagalidis, Swedish Armed Forces
www.securityofthingsworld.com
“
www.securityofthingsworld.com
BUSINESS PARTNERS 2016
www.securityofthingsworld.com
MEDIA PARTNERS 2016
SUPPORTING ASSOCIATIONS
MEDIA PARTNERS
Good awareness on security of Industrial IoT &
many interesting networking moments
Naoufel Chraiet, Sanofi Aventis
www.securityofthingsworld.com
“
ATTENDING COMPANIES
(ISC)² Chapter Germany, Adobe, Airbus Defence & Space, Allianz, Amazon Lab126, AppLift, Ardexa, Astra Zeneca, Australian
Information Security Association, Avira Romania, AXA PPP Healthcare, AXA Technology Services, BASF Business Services, BASF,
BMW Group, Brightsight, Burckhardt Compression, CASSIDIAN CyberSecurity, Ceskomoravsky cement, Checkmarx, Cloud
Security Alliance, cloudKleyer Frankfurt, Coca-Cola, Comarch Technologies, Cyber Security Sharing and Analytics, DB Systel,
degesa - deutsche gesellschaft für eigentumsschutz, Deloitte, Deutsche Telekom, DFKI - German Research Center for Artificial
Intelligence, Diagnostiek Voor U, DIN, Drax Power, DSM, Dyson, Edelmanergo, EMITEC MESSTECHNIK AGEMITEC
MESSTECHNIK, ENISA, Ericpol, Ernst & Young GmbH Wirtschaftsprüfungsgesellschaft, ESAB, EURECAT, European Patent
Office, Evonik Industries, German Federal Ministry for Economic Affairs and Energy, German Federal Ministry of the Interior,
Federal Office for Information Security, Filmkraut, Fives, FMS Wertmanagement, Fraunhofer Institut, FSResult, GE Digital, GE
Fanuc Automation Limited, Gemalto, German Federal Ministry of Defence, Giesecke & Devrient, Global Platform, Grundfos, GSMA,
HARTING Electric, Heidelberg Cement, Hella, Hewlett Packard Enterprise, Hitachi Solutions, HOB, I am The Cavalry, IBM, Infineon
Technologies, Information Security Forum, Infotecs, Inside Secure, Internet Security Alliance (ISA), IoT Analytics, Israel Trade
Center, Jungheinrich, KB, Keller Holding, KleRo, Knorr- Bremse, Korea Telecom, KPN, Kudelski Group, LM Ericsson, Lookout,
Maersk Supply Service, MANN + HUMMEL, Mastercard, Merck Group, Meritor, Microsoft, Munich RE, Nagravision, NBV Limited,
Nestle Operational Services Worldwide, Nilfisk, Norwegian Hull Club, Novozymes, NXP Semiconductors, Panasonic Europe,
Payments UK, PayPal, Philips Lighting, Post CH, Radiometer Medical, Raiffeisen Bank International, relayr, Reuters, Ritter
Starkstromtechnik, Roche Diabetes Care Spain, Rohde & Schwarz., RUAG, RWE, Safran, Sanofi Aventis, SCADAfence, SCHOTT,
SharePointCommunity, Siemens, SNCF, Statoil, Swedish Armed Forces, Swiss Re, Swisscom, Teraport, Thales Nederland, The
World Bank Group, T-Systems Multimedia Solutions, University of Zurich, UPS Netherlands, UTRC - United Technologies Research
Center, Vodafone, Volkswagen, Women in Security, Wurldtech, Zumtobel Group
www.securityofthingsworld.com
KEY TOPICS 2016
• Securing your cyber physical systems: How can you assure that the Security of
your IoT business becomes one of your most valued assets?
• Expanding your IT Security: Leverage your existing system security experience
and move towards a more complex approach by implementing intelligence led
operations
• Business Continuity Management: Prepare your digital business for the unknown
by anticipating enterprise risks and sustainably closing security gaps
• Data privacy in an interconnected world: Customize your business expertise
from the data you generate to create a secure stakeholder ecosystem
• Security strategies: How to adapt your know-how to a changing business model
and create standardized approaches to security breaches?
www.securityofthingsworld.com
I really like the mix of presentations, learning & discussions
in a circle which is not too huge nor too small
Torsten Armbrecht, Coca-Cola
www.securityofthingsworld.com“
www.securityofthingsworld.com
THE EVENT AT A GLANCE
221
LEADING EXPERTS
70:30
BUYER : SELLER
137
COMPANIES
50
SPEAKERS
20
COUNTRIES
753
MEETINGS
PARTICIPANT PROFILE
INDUSTRY SPLIT THE COMMUNITYGEOGRAPHIC SPLITSIZE
19%
16%
13%
11%
9%
8%
7%
6%
5%
5%
Public &
Government
Automotive
Software & IT
Services
Manufacturing
Pharma &
Lifescience
Telcos
Consulting &
Services
Electronics &
Semiconductors
Finance &
Insurance
Research &
Academia
49%
35%
16%
Manager /
Senior Manager
Head of /
Director
CXOs
46%
7%7%
7%
6%
6%
6%
5%
5%
5%
EMEA
Germany
Asia Pacific
Scandinavia
Switzerland
Eastern
Europe
Benelux
France
Southern
Europe
UK
USA
29%
6%
10%
20%
6%
28%
> 100.000
< 1.000
1.001 - 5.000
5.001 - 10.000
10.001 – 50.000
50.001 –
100.000
Loved the interaction, good
networking, well organized!
Ad Krikke, DSM
www.securityofthingsworld.com
“
TESTIMONIALS
www.securityofthingsworld.com
“We are at the break of a new dawn in technology, security will never be the same again and
overall privacy and (business) risks are bigger than ever.”
Bas Spierings, UPS
“This event was very useful to apprehend the security issues in the
emerging world of connected objects.”
Pierre-Yves Lhoyer, Sanofi Aventis
“The organization was perfect. The speakers’ talks and partners
discussions were also really valuable.”
Pierre Texier, SNCF
“Eye-opening insights from different industries tackling IoT
security problems in many different ways.”
Minna Blomster, AstraZeneca“Great people, lots of opportunities and great support by
everyone!”
Angelika König, IBM
“It expanded my vision and understanding of the concerns and
opportunities facing the industry as we transition towards an increasingly
connected world.”
Kevin Gillick, GlobalPlatform
“I really like the mix of presentations, learning &
discussions in a circle which is not too huge nor too small”
Torsten Armbrecht, Coca-Cola
“Loved the interaction, good networking, well organized.”
Ad Krikke, DSM“Very good overview about IoT and SoT as important
topics”
Max Meier, AXA Technology Services “Very good organization”
Milosz Godzik, Ernst & Young
“An excellent opportunity to list, talk and interact (network) with
engaged and enthusiastic colleagues”
Ross Tsagalidis, Swedish Armed Forces (SwAF)
“I've got lots of good inspiration to communicate to my CISO!”
Peter Sung, Korea Telecom
Very global attendees!
Dana Behncke, Microsoft
“Very interesting and diversified panel of attendees!”
Mikaël Dubreucq, Inside Secure “Extremely well-organised, with good speakers and networking opportunities!”
Richard Knowlton, ISA
The various forms of audience involvement were great, starting from the
icebreaker, to the dinner and the world cafés.
Gerald Maunier, Gemalto
The organization was perfect. The speakers’ talks & partners
discussions were also really valuable!
Pierre Texier, SNCF
www.securityofthingsworld.com
“
THE EVENT IN PICTURES
www.securityofthingsworld.com
www.2015.mes-production.we-conect.com
COMING UP IN 2017
www.securityofthingsworld.com
DEFINING SECURITY IN A CONNECTED WORLD
June 12 - 13, 2017 | Berlin, Germany
www.securityofthingsworld.com
www.2015.mes-production.we-conect.com
Security of Things World
is going to the USA!
November 03 – 04, 2016, Hard Rock Hotel, San Diego, CA
www.securityofthingsworldusa.com
www.securityofthingsworld.com
www.2015.mes-production.we-conect.com
APRIL 24-25, 2017 | BERLIN | GERMANY
www.deliveryofthingsworld.com
SEPTEMBER 19-20, 2016 | BERLIN | GERMANY
www.industryofthingsworld.com
www.securityofthingsworld.com
www.securityofthingsworld.com
UPCOMING EVENTS
OCTOBER 13-14 , 2016 | SAN DIEGO | USA
www.deliveryofthingsworldusa.com
FEBRUARY 20-21, 2017 | SAN DIEGO | USA
www.industryofthingsworldusa.com
www.2015.mes-production.we-conect.com
www.securityofthingsworld.com
GET IN TOUCH!
Elena Urban
Product Manager – you.CONECT
+49 (0)30 52 10 70 3 – 18
elena.urban@you-conect.com
Andreas Alexiou
Sales Director – you.CONECT
+49 (0)30 52 10 70 3 – 60
andreas.alexiou@you-conect.com
Géraud de Dieleveult
Director Partner Management - you.CONECT
+49 (0)30 52 10 70 3 – 86
geraud.de-dieuleveult@you-conect.com
TO SPONSOR TO SPEAK TO ATTEND
www.2015.mes-production.we-conect.com
POST-EVENT REPORT

Weitere ähnliche Inhalte

Was ist angesagt?

Final file fastest growing companies of 2020
Final file  fastest growing companies of 2020Final file  fastest growing companies of 2020
Final file fastest growing companies of 2020Mirror Review
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty VisualizationDoug Cogswell
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Reportaccenture
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020Ray Bugg
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0Julian Samuels
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Kevin Duffey
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
Born to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformationBorn to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformationEY
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Ray Bugg
 
EY Digital Deal Economy - Nederland
EY Digital Deal Economy - NederlandEY Digital Deal Economy - Nederland
EY Digital Deal Economy - Nederlandreichske
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 

Was ist angesagt? (20)

Final file fastest growing companies of 2020
Final file  fastest growing companies of 2020Final file  fastest growing companies of 2020
Final file fastest growing companies of 2020
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 ReportNinth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
Ninth Annual Cost of Cybercrime Study in Financial Services – 2019 Report
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
Born to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformationBorn to be digital - how leading CIOs are preparing for digital transformation
Born to be digital - how leading CIOs are preparing for digital transformation
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
 
EY Digital Deal Economy - Nederland
EY Digital Deal Economy - NederlandEY Digital Deal Economy - Nederland
EY Digital Deal Economy - Nederland
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 

Ähnlich wie Security of Things World 2016 - Post Event Report

Industry of Things World 2016 - Post Event Reports
Industry of Things World 2016 - Post Event ReportsIndustry of Things World 2016 - Post Event Reports
Industry of Things World 2016 - Post Event ReportsRamona Kohrs
 
Delivery of Things World 2016 - Post Event Report
Delivery of Things World 2016 - Post Event ReportDelivery of Things World 2016 - Post Event Report
Delivery of Things World 2016 - Post Event ReportRamona Kohrs
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agendaCopperberg
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse Microsoft
 
H3C Corporate Brochure.pdf
H3C Corporate Brochure.pdfH3C Corporate Brochure.pdf
H3C Corporate Brochure.pdfAbdulRehmanAbid6
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivNOAH Advisors
 
GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)Marjola Begaj
 
Insurtech and RegTech - drivers, taxonomy, companies in Sweden and beyond
Insurtech and RegTech - drivers, taxonomy, companies in Sweden and beyondInsurtech and RegTech - drivers, taxonomy, companies in Sweden and beyond
Insurtech and RegTech - drivers, taxonomy, companies in Sweden and beyondMichalGromek
 
Trailblazing Companies to Watch 2019 | The Enterprise World
Trailblazing Companies to Watch 2019 | The Enterprise WorldTrailblazing Companies to Watch 2019 | The Enterprise World
Trailblazing Companies to Watch 2019 | The Enterprise WorldThe Enterprise World
 
Beefing Up the Cloud
Beefing Up the CloudBeefing Up the Cloud
Beefing Up the CloudITEC
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2Jorge Rivero Sanchez
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 

Ähnlich wie Security of Things World 2016 - Post Event Report (20)

Industry of Things World 2016 - Post Event Reports
Industry of Things World 2016 - Post Event ReportsIndustry of Things World 2016 - Post Event Reports
Industry of Things World 2016 - Post Event Reports
 
Delivery of Things World 2016 - Post Event Report
Delivery of Things World 2016 - Post Event ReportDelivery of Things World 2016 - Post Event Report
Delivery of Things World 2016 - Post Event Report
 
M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
 
M2M Journal 2017
M2M Journal 2017 M2M Journal 2017
M2M Journal 2017
 
CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse
 
H3C Corporate Brochure.pdf
H3C Corporate Brochure.pdfH3C Corporate Brochure.pdf
H3C Corporate Brochure.pdf
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
Hackathon_article
Hackathon_articleHackathon_article
Hackathon_article
 
GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)
 
Insurtech and RegTech - drivers, taxonomy, companies in Sweden and beyond
Insurtech and RegTech - drivers, taxonomy, companies in Sweden and beyondInsurtech and RegTech - drivers, taxonomy, companies in Sweden and beyond
Insurtech and RegTech - drivers, taxonomy, companies in Sweden and beyond
 
Trailblazing Companies to Watch 2019 | The Enterprise World
Trailblazing Companies to Watch 2019 | The Enterprise WorldTrailblazing Companies to Watch 2019 | The Enterprise World
Trailblazing Companies to Watch 2019 | The Enterprise World
 
Beefing Up the Cloud
Beefing Up the CloudBeefing Up the Cloud
Beefing Up the Cloud
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 

Mehr von Ramona Kohrs

DTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportDTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportRamona Kohrs
 
Smart Automotive Variant.Con 2016 - Post Event Report
Smart Automotive Variant.Con 2016 - Post Event ReportSmart Automotive Variant.Con 2016 - Post Event Report
Smart Automotive Variant.Con 2016 - Post Event ReportRamona Kohrs
 
MES & Process Minds 2016 - Post Event Report
MES & Process Minds 2016 - Post Event ReportMES & Process Minds 2016 - Post Event Report
MES & Process Minds 2016 - Post Event ReportRamona Kohrs
 
CiMi.CON Evolution 2016 - Post Event Report
CiMi.CON Evolution 2016 - Post Event ReportCiMi.CON Evolution 2016 - Post Event Report
CiMi.CON Evolution 2016 - Post Event ReportRamona Kohrs
 
DTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportDTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportRamona Kohrs
 
TRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
TRACKTS! 2016 –Smart.Serialization, Track & Trace MindsTRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
TRACKTS! 2016 –Smart.Serialization, Track & Trace MindsRamona Kohrs
 
Software Defined Everything 2016 - Post Event Report
Software Defined Everything 2016 - Post Event ReportSoftware Defined Everything 2016 - Post Event Report
Software Defined Everything 2016 - Post Event ReportRamona Kohrs
 
Social Business Collaboration - Post Event Report
Social Business Collaboration - Post Event ReportSocial Business Collaboration - Post Event Report
Social Business Collaboration - Post Event ReportRamona Kohrs
 
Rethink! SPMS 2016 - Post Event Report
Rethink! SPMS 2016 - Post Event ReportRethink! SPMS 2016 - Post Event Report
Rethink! SPMS 2016 - Post Event ReportRamona Kohrs
 
Rethink! MAD Minds 2016 - Post Event Report
Rethink! MAD Minds 2016 - Post Event ReportRethink! MAD Minds 2016 - Post Event Report
Rethink! MAD Minds 2016 - Post Event ReportRamona Kohrs
 
Rethink! ITIS 2016 - Post Event Report
Rethink! ITIS 2016 - Post Event ReportRethink! ITIS 2016 - Post Event Report
Rethink! ITIS 2016 - Post Event ReportRamona Kohrs
 
Rethink! ITEM 2016 - Post Event Report
Rethink! ITEM 2016 - Post Event ReportRethink! ITEM 2016 - Post Event Report
Rethink! ITEM 2016 - Post Event ReportRamona Kohrs
 
Rethink! HR & Technology Minds 2016
Rethink! HR & Technology Minds 2016Rethink! HR & Technology Minds 2016
Rethink! HR & Technology Minds 2016Ramona Kohrs
 
Rethink! Corporate Finance Minds 2016
Rethink! Corporate Finance Minds 2016Rethink! Corporate Finance Minds 2016
Rethink! Corporate Finance Minds 2016Ramona Kohrs
 
Rethink! Connected Customer 360° - Post Event Report
Rethink! Connected Customer 360° - Post Event ReportRethink! Connected Customer 360° - Post Event Report
Rethink! Connected Customer 360° - Post Event ReportRamona Kohrs
 
Corporate Governance Compliance Strategies - Post Event Report
Corporate Governance Compliance Strategies - Post Event ReportCorporate Governance Compliance Strategies - Post Event Report
Corporate Governance Compliance Strategies - Post Event ReportRamona Kohrs
 
Virtual Workplace Evolution 2016 - Post Event Report
Virtual Workplace Evolution 2016 - Post Event ReportVirtual Workplace Evolution 2016 - Post Event Report
Virtual Workplace Evolution 2016 - Post Event ReportRamona Kohrs
 
Smart Variant CON 2016
Smart Variant CON 2016Smart Variant CON 2016
Smart Variant CON 2016Ramona Kohrs
 

Mehr von Ramona Kohrs (20)

DTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportDTIM 2016 - Post Event Report
DTIM 2016 - Post Event Report
 
Smart Automotive Variant.Con 2016 - Post Event Report
Smart Automotive Variant.Con 2016 - Post Event ReportSmart Automotive Variant.Con 2016 - Post Event Report
Smart Automotive Variant.Con 2016 - Post Event Report
 
MES & Process Minds 2016 - Post Event Report
MES & Process Minds 2016 - Post Event ReportMES & Process Minds 2016 - Post Event Report
MES & Process Minds 2016 - Post Event Report
 
CiMi.CON Evolution 2016 - Post Event Report
CiMi.CON Evolution 2016 - Post Event ReportCiMi.CON Evolution 2016 - Post Event Report
CiMi.CON Evolution 2016 - Post Event Report
 
DTIM 2016 - Post Event Report
DTIM 2016 - Post Event ReportDTIM 2016 - Post Event Report
DTIM 2016 - Post Event Report
 
TRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
TRACKTS! 2016 –Smart.Serialization, Track & Trace MindsTRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
TRACKTS! 2016 –Smart.Serialization, Track & Trace Minds
 
Software Defined Everything 2016 - Post Event Report
Software Defined Everything 2016 - Post Event ReportSoftware Defined Everything 2016 - Post Event Report
Software Defined Everything 2016 - Post Event Report
 
Social Business Collaboration - Post Event Report
Social Business Collaboration - Post Event ReportSocial Business Collaboration - Post Event Report
Social Business Collaboration - Post Event Report
 
SAMS Europe 2016
SAMS Europe 2016SAMS Europe 2016
SAMS Europe 2016
 
Rethink! SPMS 2016 - Post Event Report
Rethink! SPMS 2016 - Post Event ReportRethink! SPMS 2016 - Post Event Report
Rethink! SPMS 2016 - Post Event Report
 
Rethink! MAD Minds 2016 - Post Event Report
Rethink! MAD Minds 2016 - Post Event ReportRethink! MAD Minds 2016 - Post Event Report
Rethink! MAD Minds 2016 - Post Event Report
 
Rethink! ITIS 2016 - Post Event Report
Rethink! ITIS 2016 - Post Event ReportRethink! ITIS 2016 - Post Event Report
Rethink! ITIS 2016 - Post Event Report
 
Rethink! ITEM 2016 - Post Event Report
Rethink! ITEM 2016 - Post Event ReportRethink! ITEM 2016 - Post Event Report
Rethink! ITEM 2016 - Post Event Report
 
Rethink! HR & Technology Minds 2016
Rethink! HR & Technology Minds 2016Rethink! HR & Technology Minds 2016
Rethink! HR & Technology Minds 2016
 
Rethink! Corporate Finance Minds 2016
Rethink! Corporate Finance Minds 2016Rethink! Corporate Finance Minds 2016
Rethink! Corporate Finance Minds 2016
 
Rethink! Connected Customer 360° - Post Event Report
Rethink! Connected Customer 360° - Post Event ReportRethink! Connected Customer 360° - Post Event Report
Rethink! Connected Customer 360° - Post Event Report
 
Corporate Governance Compliance Strategies - Post Event Report
Corporate Governance Compliance Strategies - Post Event ReportCorporate Governance Compliance Strategies - Post Event Report
Corporate Governance Compliance Strategies - Post Event Report
 
Virtual Workplace Evolution 2016 - Post Event Report
Virtual Workplace Evolution 2016 - Post Event ReportVirtual Workplace Evolution 2016 - Post Event Report
Virtual Workplace Evolution 2016 - Post Event Report
 
Smart Variant CON 2016
Smart Variant CON 2016Smart Variant CON 2016
Smart Variant CON 2016
 
SAMS 2016
SAMS 2016SAMS 2016
SAMS 2016
 

Kürzlich hochgeladen

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Kürzlich hochgeladen (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Security of Things World 2016 - Post Event Report

  • 2. OVERVIEW www.securityofthingsworld.com Security of Things World 2016 was a huge success! Over 220 international attendees came together in June in Berlin to discuss and define the future role of security in the interconnected and smart world of the Internet of Things for businesses. We had the honour to hear from European Government representatives (Federal Ministry of the Interior, Federal Office for Information Security), from the most innovative real world case studies on how Security is challenging businesses and from the leading solution providers in the field (GE Digital, HPE, IBM, Microsoft and many more). With all major verticals represented, Security of Things World is the event in the centre of where connections are made, news are announced and the Security of IoT community comes together to define future security strategies. What does the future hold for Security in the Internet of Things context? The consensus was: communicate more and share knowledge. We, as a community, need to come together, create partnerships and work on projects that will allow us to identify how security technologies can be effectively applied to change the way business is done. We cannot afford to see security as an afterthought. It needs to be part of strategies and design from the beginning. Partnerships, security, standards, innovation and an open mind for the possibilities this new era of technologies is opening up are key to take full advantage of IoT Security. Security of Things World is coming back, bigger and better in 2017 to bring you once again the most thought-provoking and leading experts in the field, making this an event not to be missed. Join us again next year for the chance to be part of the elite group of experts shaping the future of Security. For more information go to: www.securityofthingsworld.com
  • 3. Interesting learnings and benchmarking of security strategies in the real world Andreas Maack, Merck KGaA www.securityofthingsworld.com “
  • 7. An excellent opportunity to talk & network with engaged and enthusiastic colleagues Ross Tsagalidis, Swedish Armed Forces www.securityofthingsworld.com “
  • 10. Good awareness on security of Industrial IoT & many interesting networking moments Naoufel Chraiet, Sanofi Aventis www.securityofthingsworld.com “
  • 11. ATTENDING COMPANIES (ISC)² Chapter Germany, Adobe, Airbus Defence & Space, Allianz, Amazon Lab126, AppLift, Ardexa, Astra Zeneca, Australian Information Security Association, Avira Romania, AXA PPP Healthcare, AXA Technology Services, BASF Business Services, BASF, BMW Group, Brightsight, Burckhardt Compression, CASSIDIAN CyberSecurity, Ceskomoravsky cement, Checkmarx, Cloud Security Alliance, cloudKleyer Frankfurt, Coca-Cola, Comarch Technologies, Cyber Security Sharing and Analytics, DB Systel, degesa - deutsche gesellschaft für eigentumsschutz, Deloitte, Deutsche Telekom, DFKI - German Research Center for Artificial Intelligence, Diagnostiek Voor U, DIN, Drax Power, DSM, Dyson, Edelmanergo, EMITEC MESSTECHNIK AGEMITEC MESSTECHNIK, ENISA, Ericpol, Ernst & Young GmbH Wirtschaftsprüfungsgesellschaft, ESAB, EURECAT, European Patent Office, Evonik Industries, German Federal Ministry for Economic Affairs and Energy, German Federal Ministry of the Interior, Federal Office for Information Security, Filmkraut, Fives, FMS Wertmanagement, Fraunhofer Institut, FSResult, GE Digital, GE Fanuc Automation Limited, Gemalto, German Federal Ministry of Defence, Giesecke & Devrient, Global Platform, Grundfos, GSMA, HARTING Electric, Heidelberg Cement, Hella, Hewlett Packard Enterprise, Hitachi Solutions, HOB, I am The Cavalry, IBM, Infineon Technologies, Information Security Forum, Infotecs, Inside Secure, Internet Security Alliance (ISA), IoT Analytics, Israel Trade Center, Jungheinrich, KB, Keller Holding, KleRo, Knorr- Bremse, Korea Telecom, KPN, Kudelski Group, LM Ericsson, Lookout, Maersk Supply Service, MANN + HUMMEL, Mastercard, Merck Group, Meritor, Microsoft, Munich RE, Nagravision, NBV Limited, Nestle Operational Services Worldwide, Nilfisk, Norwegian Hull Club, Novozymes, NXP Semiconductors, Panasonic Europe, Payments UK, PayPal, Philips Lighting, Post CH, Radiometer Medical, Raiffeisen Bank International, relayr, Reuters, Ritter Starkstromtechnik, Roche Diabetes Care Spain, Rohde & Schwarz., RUAG, RWE, Safran, Sanofi Aventis, SCADAfence, SCHOTT, SharePointCommunity, Siemens, SNCF, Statoil, Swedish Armed Forces, Swiss Re, Swisscom, Teraport, Thales Nederland, The World Bank Group, T-Systems Multimedia Solutions, University of Zurich, UPS Netherlands, UTRC - United Technologies Research Center, Vodafone, Volkswagen, Women in Security, Wurldtech, Zumtobel Group www.securityofthingsworld.com
  • 12. KEY TOPICS 2016 • Securing your cyber physical systems: How can you assure that the Security of your IoT business becomes one of your most valued assets? • Expanding your IT Security: Leverage your existing system security experience and move towards a more complex approach by implementing intelligence led operations • Business Continuity Management: Prepare your digital business for the unknown by anticipating enterprise risks and sustainably closing security gaps • Data privacy in an interconnected world: Customize your business expertise from the data you generate to create a secure stakeholder ecosystem • Security strategies: How to adapt your know-how to a changing business model and create standardized approaches to security breaches? www.securityofthingsworld.com
  • 13. I really like the mix of presentations, learning & discussions in a circle which is not too huge nor too small Torsten Armbrecht, Coca-Cola www.securityofthingsworld.com“
  • 14. www.securityofthingsworld.com THE EVENT AT A GLANCE 221 LEADING EXPERTS 70:30 BUYER : SELLER 137 COMPANIES 50 SPEAKERS 20 COUNTRIES 753 MEETINGS
  • 15. PARTICIPANT PROFILE INDUSTRY SPLIT THE COMMUNITYGEOGRAPHIC SPLITSIZE 19% 16% 13% 11% 9% 8% 7% 6% 5% 5% Public & Government Automotive Software & IT Services Manufacturing Pharma & Lifescience Telcos Consulting & Services Electronics & Semiconductors Finance & Insurance Research & Academia 49% 35% 16% Manager / Senior Manager Head of / Director CXOs 46% 7%7% 7% 6% 6% 6% 5% 5% 5% EMEA Germany Asia Pacific Scandinavia Switzerland Eastern Europe Benelux France Southern Europe UK USA 29% 6% 10% 20% 6% 28% > 100.000 < 1.000 1.001 - 5.000 5.001 - 10.000 10.001 – 50.000 50.001 – 100.000
  • 16. Loved the interaction, good networking, well organized! Ad Krikke, DSM www.securityofthingsworld.com “
  • 17. TESTIMONIALS www.securityofthingsworld.com “We are at the break of a new dawn in technology, security will never be the same again and overall privacy and (business) risks are bigger than ever.” Bas Spierings, UPS “This event was very useful to apprehend the security issues in the emerging world of connected objects.” Pierre-Yves Lhoyer, Sanofi Aventis “The organization was perfect. The speakers’ talks and partners discussions were also really valuable.” Pierre Texier, SNCF “Eye-opening insights from different industries tackling IoT security problems in many different ways.” Minna Blomster, AstraZeneca“Great people, lots of opportunities and great support by everyone!” Angelika König, IBM “It expanded my vision and understanding of the concerns and opportunities facing the industry as we transition towards an increasingly connected world.” Kevin Gillick, GlobalPlatform “I really like the mix of presentations, learning & discussions in a circle which is not too huge nor too small” Torsten Armbrecht, Coca-Cola “Loved the interaction, good networking, well organized.” Ad Krikke, DSM“Very good overview about IoT and SoT as important topics” Max Meier, AXA Technology Services “Very good organization” Milosz Godzik, Ernst & Young “An excellent opportunity to list, talk and interact (network) with engaged and enthusiastic colleagues” Ross Tsagalidis, Swedish Armed Forces (SwAF) “I've got lots of good inspiration to communicate to my CISO!” Peter Sung, Korea Telecom Very global attendees! Dana Behncke, Microsoft “Very interesting and diversified panel of attendees!” Mikaël Dubreucq, Inside Secure “Extremely well-organised, with good speakers and networking opportunities!” Richard Knowlton, ISA The various forms of audience involvement were great, starting from the icebreaker, to the dinner and the world cafés. Gerald Maunier, Gemalto
  • 18. The organization was perfect. The speakers’ talks & partners discussions were also really valuable! Pierre Texier, SNCF www.securityofthingsworld.com “
  • 19. THE EVENT IN PICTURES www.securityofthingsworld.com
  • 20. www.2015.mes-production.we-conect.com COMING UP IN 2017 www.securityofthingsworld.com DEFINING SECURITY IN A CONNECTED WORLD June 12 - 13, 2017 | Berlin, Germany www.securityofthingsworld.com
  • 21. www.2015.mes-production.we-conect.com Security of Things World is going to the USA! November 03 – 04, 2016, Hard Rock Hotel, San Diego, CA www.securityofthingsworldusa.com www.securityofthingsworld.com
  • 22. www.2015.mes-production.we-conect.com APRIL 24-25, 2017 | BERLIN | GERMANY www.deliveryofthingsworld.com SEPTEMBER 19-20, 2016 | BERLIN | GERMANY www.industryofthingsworld.com www.securityofthingsworld.com www.securityofthingsworld.com UPCOMING EVENTS OCTOBER 13-14 , 2016 | SAN DIEGO | USA www.deliveryofthingsworldusa.com FEBRUARY 20-21, 2017 | SAN DIEGO | USA www.industryofthingsworldusa.com
  • 23. www.2015.mes-production.we-conect.com www.securityofthingsworld.com GET IN TOUCH! Elena Urban Product Manager – you.CONECT +49 (0)30 52 10 70 3 – 18 elena.urban@you-conect.com Andreas Alexiou Sales Director – you.CONECT +49 (0)30 52 10 70 3 – 60 andreas.alexiou@you-conect.com Géraud de Dieleveult Director Partner Management - you.CONECT +49 (0)30 52 10 70 3 – 86 geraud.de-dieuleveult@you-conect.com TO SPONSOR TO SPEAK TO ATTEND