Silviu Bostan
Winning the digital game with a collaborative ecosystem
· Past

Winning the digital game with a collaborative ecosystem

There is certainly no single, standardized way of getting started and enabling an organization to implement and monetize IIoT. Our goal in this virtual conference is to inspire manufacturers by showing approaches and perspectives that they might embrace to achieve impact at scale. In other words, our speakers will explain, using real examples, how to […]

Read more →
Monetizing IIoT – real life use cases in the manufacturing space
· Past

Monetizing IIoT – real life use cases in the manufacturing space

There is certainly no single, standardized way of getting started and enabling an organization to implement and monetize IIoT. Our goal in this virtual conference is to inspire manufacturers by showing approaches and perspectives that they might embrace to achieve impact at scale. In other words, our speakers will explain, using real examples, how to […]

Read more →
Securing the Industrial IoT Ecosystem
· Past

Securing the Industrial IoT Ecosystem

New digital services and connected industrial controls systems continue to be at high risk from security breaches with subsequent impacts to consumer privacy and now personal safety. This webinar will review these market trends and risks, and the challenge of securing Operational Technology (OT) including industrial control systems (ICS) and other critical infrastructure devices and […]

Read more →
Transforming Operations: How IIoT Creates Real-TIme Visibility for Manufacturing
· Past

Transforming Operations: How IIoT Creates Real-TIme Visibility for Manufacturing

Creating real-time visibility in operations is about delivering the right information at the right time to the right person. In today’s factories, visibility is often limited because of disparate IT and OT systems, reports based on data from last week, and static, paper-based processes. Industrial IoT has the power to transform visibility in operations by […]

Read more →
AR Opportunities & Cyber challenges in Transportation and Logistics Industry
· Past

AR Opportunities & Cyber challenges in Transportation and Logistics Industry

The world’s logistics and transportation industry is changing fast – and is in need of solutions to a number of key, pressing business issues. Also, challenges continue to grow for the ICS security community. In this two-hour virtual conference, we will discuss business challenges and opportunities facing the Transportation and Logistics industry and how we […]

Read more →
Pushing the Grid Edge: Turn the challenges of a changing energy landscape into business potential
· Past

Pushing the Grid Edge: Turn the challenges of a changing energy landscape into business potential

This webcast is designed to be a virtual 90 minutes conference on the topic of distributed generation technologies. In this webinar, you will learn what distributed generation, and grid edge means in practical terms, trending applications, challenges, barriers and market outlook, and growth. Also, our speakers will explain how to turn the disruptive effects of […]

Read more →
Industrial cybersecurity: zero touch provisioning
· Past

Industrial cybersecurity: zero touch provisioning

This webcast is designed to be a virtual 100 minutes conference on the topic of secure provisioning for industrial devices. IoT Industrial Cloud systems are rapidly maturing as packaged systems that can sense, collect, analyze, and action on edge devices. However, the software-based device security and manual/proprietary provisioning methods delivered by platform providers are preventing […]

Read more →
Industrial IoT Cybersecurity: from the shop floor to the board room
· Past

Industrial IoT Cybersecurity: from the shop floor to the board room

Challenges continue to grow for the ICS security community. Blurring boundaries between IT, OT and IoT are increasing the need for more integrated, collaborative cybersecurity strategies. This 90 minutes virtual conference is designed to answer some essential questions about ICS cybersecurity: how to build a better view of our ICS, how to combat the rise […]

Read more →