Understanding IoT Cryptography for Law Enforcement, Homeland Security and Forensic Analysts

Sponsored By: TeleStrategies' ISS WorldŽ

April 23, 2019 : Online Webinar

TIME:
9:00 AM - 10:00 AM New York Time, Eastern USA Time

Free for Law Enforcement, the government intelligence community, telecom operators and private enterprise cyber security managers. Registration with Government or Corporate e-mail address is required.


Click here to register  Click Here To Register


Understanding IoT Cryptography for Law Enforcement, Homeland Security and Forensic Analysts

Almost all IoT analysts predict the number of IoT devices will exceed 20 billion by year 2020 and over a trillion by 2030. But if you are a Law Enforcement, Homeland Security or Forensics specialist you have to appreciate that there are significant differences in these IoT devices regarding cryptography strengths and weaknesses.

This webinar presents an overview of IoT from a cryptography capabilities perspective for non-technical government analysts. Specifically today's IoT cryptography basics, what IoT devices have weak and strong cryptography functionalities and what cryptography enhancements will 5G networks provide for government IoT applications.

Part 1: IoT Cryptography Basics:

  • The Cryptography functions required for overall IoT Security
  • Cryptography functionality differences between smartphone class devices and resource-constrained IoT devices
  • Cryptography requirements for IoT devices actually connected to the Internet vs. non-direct connected devices such as M2M units.
  • What are the cryptography requirements for IoT communications via 3G/4G cellular, WiFi, Bluetooth and Zigbee 
  • What are the differences between cryptography requirements for monitoring vs control-oriented IoT devices vs M2M units
  • How does cryptography strength relate to data traffic load, response or latent delay and other performance requirements
  • Cryptography considerations for LTE-M vs. NB-IoT
  • What are the challenges in upgrading resource-constrained IoT devices to TLS grade encryption

 Part 2: Today’s IoT Markets and Cryptography Requirements

  • General Cryptography requirement for IoT Devices for Residential, Smart City, Industrial, Homeland Security, Law Enforcement and Defense applications
  • IoT Hacking Successes (Mirai, The Jeep Hack, ect.) due to weak cryptography
  • Representative IoT products deployed in government networks
  • Cryptography features as an IoT government product differentiator

Part 3: Future 5G Cryptography Features Supporting IoT

  • What to expect with new 5G networks regarding enhanced cryptography features
  • What is 5G Network Slicing and what does it offer customized IoT networks
  • 5G network IoT connectivity opportunities for replacing WiFi, Zigbee and other unlicensed wireless networks
  • What to expect from 5G MVNO-IoT providers
  • Plus considerations for deploying Post "Quantum Computing" Cryptography in IoT and M2M devices now. 

Presenter:

Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Click here to register  Click Here To Register

Webinar FAQ's

All Contents Copyright © 2019
TeleStrategies, Inc.
6845 Elm Street, Suite 310
McLean, VA 22101

voice:
703-734-7050 fax:703-893-3197