i3 - September/October 2016 - 15

By Dave Wilson

Tech

PIPE LINE

The Consumer Technology
Security Summit
Online Trust Alliance

H

COURTESY OF CTA

ow do consumer technology companies manage the
secruity of products and services connected to the
internet? The Security Summit, a day-long program,
will include discussions on what the industry is doing
to make consumer devices and the internet more secure. Held in
October at the CTA Technology & Standards Forum
in Austin, the Summit will include sessions
by the FIDO Alliance, the Internet Society,
the Online Trust Alliance and the Trusted
Computing Group, all involved in making
consumer technology more secure.
Security is a complex puzzle with many
interlocking pieces. These pieces have
functions similar to the security elements in your home such as locks on your
doors. On the internet you have login IDs,
passwords and other forms of authentication. In your home you might hire a
security firm to monitor your property
for intrusions. On the internet you
could subscribe to a security service that
monitors your computer for viruses and
hacking attempts.
It's up to you to lock your doors,
keep your keys safe and ensure that the
security you've chosen is appropriate.
On the internet it's also up to you to
use appropriate passwords, keep your
authentication methods secure and away
from those who might steal your data and
choose appropriate security methods for
your data.
The providers of security systems also
play an important role both at home and
online. They make sure the methods
C TA . t e c h / i 3

they've designed to keep intruders out are
up to the task and perform as intended.
Industry standards, guidelines and best
practices help them identify appropriate
ways to do this.
The Security Summit will cover what's
expected of the different players in the
consumer technology ecosystem, and the
best practices they should follow.

Internet Society
One industry group bringing its expertise
to the Summit is the Internet Society
(ISOC), which promotes the development,
evolution and use of the internet by
developing standards, educating people,
and fostering discussion to further develop
the internet. ISOC runs the Internet
Engineering Task Force (IETF), which
creates technical documents that influence
the way people design, use and manage
the internet. IETF has many active
working groups, including 20 addressing
security. ISOC will lead a session on how
different players in the internet ecosystem
can work collaboratively to create a more
secure world. ISOC's Chief Internet
Technology Officer Olaf Kolkman will be
the lunch speaker.

Online Trust Alliance
Another industry group bringing its
expertise to the Summit is the Online
Trust Alliance (OTA), which develops
best practices and tools to enhance
protection of users' security, privacy
and identity. OTA educates businesses,
policy makers and stakeholders about
security and privacy issues. It supports
collaborative public-private partnerships, reports on how organizations are
performing when it comes to privacy and
security, and supports meaningful selfregulation and data stewardship.
OTA will lead sessions on best
practices for securing IoT devices,
security concerns for smart homes and
smart cities, and top consumer-facing
websites when it comes to data security
and privacy.

Trusted Computing Group
Another industry group at the Summit
will be the Trusted Computing Group
(TCG), which develops industry standards that enable secure computing.
These standards cover secure authentication and strong protection of user
identities, establishing strong machine
identities and network integrity, and
protection of business-critical data and
systems. TCG will lead a session on
securing the Internet of Things.
n
The CTA Technology & Standards Forum,
runs October 18-20, 2016 at the Renaissance
Austin Hotel in Austin, Tx. See details at CTA.
tech/Events.
SEPTEMBER/OCTOBER 2016

15


http://www.internetsociety.org/ http://www.trustedcomputinggroup.org https://otalliance.org/ https://www.cta.tech/Events/Event-List/Technology-Standards-Forum.aspx https://www.cta.tech/Events/Event-List/Technology-Standards-Forum.aspx http://cta.tech/events http://cta.tech/events http://cta.tech/i3

i3 - September/October 2016

Table of Contents for the Digital Edition of i3 - September/October 2016

Contents
i3 - September/October 2016 - Cover1
i3 - September/October 2016 - Cover2
i3 - September/October 2016 - Contents
i3 - September/October 2016 - 2
i3 - September/October 2016 - 3
i3 - September/October 2016 - 4
i3 - September/October 2016 - 5
i3 - September/October 2016 - 6
i3 - September/October 2016 - 7
i3 - September/October 2016 - 8
i3 - September/October 2016 - 9
i3 - September/October 2016 - 10
i3 - September/October 2016 - 11
i3 - September/October 2016 - 12
i3 - September/October 2016 - 13
i3 - September/October 2016 - 14
i3 - September/October 2016 - 15
i3 - September/October 2016 - 16
i3 - September/October 2016 - 17
i3 - September/October 2016 - 18
i3 - September/October 2016 - 19
i3 - September/October 2016 - 20
i3 - September/October 2016 - 21
i3 - September/October 2016 - 22
i3 - September/October 2016 - 23
i3 - September/October 2016 - 24
i3 - September/October 2016 - 25
i3 - September/October 2016 - 26
i3 - September/October 2016 - 27
i3 - September/October 2016 - 28
i3 - September/October 2016 - 29
i3 - September/October 2016 - 30
i3 - September/October 2016 - 31
i3 - September/October 2016 - 32
i3 - September/October 2016 - 33
i3 - September/October 2016 - 34
i3 - September/October 2016 - 35
i3 - September/October 2016 - 36
i3 - September/October 2016 - 37
i3 - September/October 2016 - 38
i3 - September/October 2016 - 39
i3 - September/October 2016 - 40
i3 - September/October 2016 - 41
i3 - September/October 2016 - 42
i3 - September/October 2016 - 43
i3 - September/October 2016 - 44
i3 - September/October 2016 - 45
i3 - September/October 2016 - 46
i3 - September/October 2016 - 47
i3 - September/October 2016 - 48
i3 - September/October 2016 - 49
i3 - September/October 2016 - 50
i3 - September/October 2016 - 51
i3 - September/October 2016 - 52
i3 - September/October 2016 - Cover3
i3 - September/October 2016 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210304
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com