Olympia Kensington, London, UK
14-15 November 2017

Building the IoT Ecosystem – platforms, architectures, applications and connectivity


Please find the brief IoTBuild EMEA conference programme below
Full agenda coming soon

Welcome Registration & Refreshments

09:00-09:15 – Chair’s Opening Remarks

Building the Enterprise IoT Ecosystem

09:15-09:45 – KEYNOTE PRESENTATION: Why you should care about IoT

The market interest in IoT in undeniable, but many businesses have yet to fully evaluate and set their smart product strategy. This keynote presentation will offer attendees advice on the core areas to consider when looking to implement IoT within their organisation, including:

• The importance of properly redefining the scope of your IT infrastructure to operational tech domains and consumer-facing
• Dealing with the fallout of converging old and latest technologies within your organisation
• Applying IoT in specific use cases


This session is reserved for our lead sponsor

10:05-10:35 – KEYNOTE PANEL DISCUSSION: Innovating the era of IoT

Numerous examples of businesses creating revenue opportunities through the application of advanced technologies pop up in the news weekly. However, there remains still too few companies that have effectively demonstrated a clear path to innovation, delivered in an effortless manner. Join this discussion to hear from those that have succeeded in reshaping their business’ offerings, creating previously unimagined opportunities to their customer base.
Themes to be discussed will include:

• Getting your business ready to innovate
• Navigating technology selection to support your digital transformation
• Creating a bold approach for generating and managing data
• Building new revenue streams through intelligent application of the plethora of data available

Stream 1
IoT Technology Strategy

Stream 2
Engineering for IoT

10:05-10:15 – Chair’s Opening Remarks
10:15-10:45 – PRESENTATION: Why IoT is the Engineer’s Challenge

Business leaders have been challenged with uncovering the value of IoT. But once the decision is made, and commitment made, it is time for development to start. The IT team needs to make purchasing decisions, acquire new skills and then connect technologies in a future-proofed and secure way. All this in an industry where best practice and standards are yet not well-established.

This session will:
• Explore the key challenges that engineering teams are faced with while developing a smart product
• Understanding where and how to seek advice and expertise

10:35-11:05 – Networking Break and 1-2-1 Meetings
10:45-11:15 – Networking Break and 1-2-1 Meetings

IoT Architecture & Application Development

11:05-11:35 – PRESENTATION: Failing fast and engineering for tomorrow

IoT is still for many in its pilot stage, with organisations trying to uncover its true business value. As the industry has not found a full-proof way to quickly build and deploy, the risk of investing in projects that will not materialise or not succeed is high.

This session will consider:
• How not to spend a fortune on IoT
• Adopting a start-up mentality towards IoT within your enterprise
• How the Agile Manifesto can help you when rolling-out enterprise-wide IoT

11:15-11:45 – PRESENTATION: IoT operating systems

As traditional operating systems were not meant to be used for IoT, there is an urgent need for low power, rapid response rates with several features. Even more, the need for large memory footprints makes it hard for small devices to support this capability.

This session will present:
• The developments in IoT-specific operating systems and their features
• Practical advice on how to make the right choice

11:35-12:05 – PRESENTATION: IoT & Containers – Managing an IoT Environment at Scale

IoT and container tech have become intricately connected with each other and with all the other major trends in enterprise computing: cloud, mobility, big data and security since they burst onto the IoT scene around 4 years ago.
These game-changing technologies, especially when coupled together, are widely expected to have even more long-term consequences for how applications are developed, deployed and maintained throughout their life cycle, creating tremendous business opportunities and very real risks for solution providers.

This session will explain why Containers constitute a perfect match for your IoT strategy!

11:45-12:15 – PRESENTATION: IoT & Containers – Adopting Containers into your IoT Roll-out

• Using containers to build a microservices architecture
• Microservices don’t require rewriting entire applications from zero. Just add new features and plug to the existing apps
• Keeping a light codebase offers minimum complexity and improved maintainability
• Lack of dependencies makes microservices easier to deploy
• Unique ability to scale

12:05-12:35 – PANEL DISCUSSION: Embedded Application Development Moves to the IoT Era

Many would argue that businesses should be focusing all their efforts on application development, rather than the building of the rest of the stack internally…But how do you build useful IoT applications?
This session will examine:

• Which specific app building platforms can offer true support to you and your organisation?
• Which existing tools can offer you the capacity to modify or update already deployed applications?
• What skillset does an embedded-platform developer need in an IoT era?
• Coping with the diversity of target devices

12:15-13:05 – WORKSHOP: What Exactly Should ‘Good’ IoT Architecture Look Like?

Setting the ground work for any project is essential for its success. This session provides an overview of how the IoT stack is build and how to make the technology selection and development fast, secure and cost efficient.

• What are the components is comprises of
• What are the technologies used to build IoT
• How are devices connected

12:35-13:35 – Networking Lunch and 1-2-1 Meetings
13:05-14:05 – Networking Lunch and 1-2-1 Meetings

IoT Security

13:35-14:05 – PANEL DISCUSSION: Understanding the IoT Risk Landscape

Security is often cited as a key obstacle for many companies when considering some form of IoT implementation within their organisation….and rightly so! Inadequate security can, and undoubtedly will, be an organisation’s downfall. However, security needn’t be a barrier when deploying new systems if it is given appropriate time and consideration at development stages. This session will offer perspectives on the threat landscape and recommendations on how to protect your systems.

Key themes include:
• Changing perceptions on assessing and managing risk
• Adapting your IT internal audit plan to be more forward thinking
• Understanding your security level of maturity
• Security to be a CEO driven strategy
• Preparing for tomorrow’s IT risks: Drones, sensors, open-source, cognitive
• Performing exhaustive third party risk management
• Tools for today’s internal auditor

Stephen Mellor, CTO, IIC

14:05-14:35 – PANEL DISCUSSION: The Supply Chain of Trust

Delivering strong, fit-for-purpose, resilient security features goes far beyond the latest encryption and technical standards. It requires each player in the supply chain to recognise the importance of security and implement it within their own business practices. Both industry and market need to adopt the concept of a “chain of trust” which will allow each player to identify trusted suppliers and in turn provide trusted products and services to their customers.

Join this panel to hear key questions to consider when creating your own ‘chain of trust’, including:
• Establishing good security governance within your own organisation
• Creating clear security policy checklists when considering new partners
• Security standards – How to ensure you and your partners are up-to-date with the latest security protocols
• Effective risk assessment and clarity on where risk and responsibility lie within your ‘chain of trust’

Confirmed Panellists include: 

Pelle Aardeweck, IT Transformation Manager, Shell

14:05-14:35 – PRESENTATION: Key Steps to Developing Secure IoT Products

Your IoT system is only ever as secure as its weakest link. Join this workshop to hear about the tools and processes that can be used to safeguard against IoT cybersecurity threats.

Discussion topics will include:
• What constitutes good security?
• Future-proofing your IoT security strategy so its fit for purpose now and tomorrow
• How to ensure high access-level security
• Designing and implementing a secure firmware/software update process
• Ensuring your encryption, authentication and integrity security protocols are robust
• Penetration testing for thorough security assessments and reviews
• Securing mobile apps and/or gateways that connect with your IoT products
• Implementing a secure foundation of trust within your organisation

14:35-15:05 – PRESENTATION: Going the Extra Mile to Ensure IoT Security

Join the Success Story sessions and hear from peers who have gone through the technology selection and building process and learn from their experiences and hands-on advice.

• Guaranteeing the high performance required to connect your smart objects and environments
• How to you organise your API teams?

14:35-15:25 – WORKSHOP: How do IoT and Cloud Security Differ?

You might think that if your Cloud is secure, there is no need to worry, right?! There are however differences between Cloud and IoT, and this session will explore the complexities of moving to an IoT security model.

Core challenges to be discussed in this workshop will include:
• How best to organise your API teams?
• Guaranteeing high performance, high capacity connectivity to connect smart objects with their environments
• Ensuring engineers and IT experts are working together properly

15:05-15:35 – Networking Break and 1-2-1 Meetings
15:25-15:55 – Networking Break and 1-2-1 Meetings

IoT Platforms

15:35-16:05 – PANEL DISCUSSION: Platform Wars!

The choice of IoT Platform is probably the most crucial decision you’ll make on your IoT journey, to ensure scalability, longevity, and security.

This session will cover the key areas you need to consider when making your platform choice, including:
• What are the most prominent features to look for from a perspective platform?
• Look before you leap; find comprehensive, distinctive solutions for your industry and industry-specific needs
• To build or not to build (from scratch)?
• What is the scalability of your enterprise? What is the projected expansion of the IoT and how can the platform support the estimated need for scalability?
• What is the extend of your legacy architecture? Where are the opportunities for new and old technology to interlock?
• What is the best data management strategy to adopt?

15:55-16:45 – WORKSHOP: IoT Platforms – Characteristics and Selection Best Practices

Once you’ve made your platform choice you need to have 100% confidence in its suitability for purpose within your organisation – After all, it’s hard to go back once you’ve made your choice! So how do you minimise the risks when looking to invest in a smart platform?

Join this workshop to examine what you should be looking for when making your platform selection, including:
• What sort of device management and integration support is available?
• Security! Is it fit for purpose both now and in the future?
• Data collection protocols
• Data analytic capabilities and scalabilities
• Is there adequate support for virtualisation?

16:05-16:35 – PANEL/PRESENTATION: Everything you Need to Know About IoT & Blockchain

Unlike many things, the hype around blockchain is not undeserved; its ability to offer secure and controlled protection and access to your data is real! However, as a ‘new’ technology, knowledge of its potential is not widespread within current enterprise board rooms.

Join this discussion to hear the facts on blockchain’s place in your future IoT platform from tested use cases in:
• How IoT is incorporating the principles of Blockchain
• How distributed ledger technologies (DLT) can lead to more secure, smart-device economies
• Building trust, reducing cost and accelerating transactions with DLTs
• Is blockchain the truly missing link to settle security, privacy and reliability concerns in IoT, or are there better alternatives?
• What are the challenges of using Blockchain in IoT?

16:35-17:05 – Closing Keynote

17:05 – Networking Drinks & Party

Registration & Refreshments

09:00-09:15 – Chair’s Opening Remarks
09:15-09:45 – KEYNOTE PANEL DISCUSSION PRESENTATION: Overcoming Organisational Fears of IoT Investment

Long cited as a stumbling-block to wide-scale adoption of IoT – gaining stakeholder engagement within the business, particularly at the primary decision-maker levels. So, when faced with this challenge, how do you squash fears at the C and VP level about IoT investment? Whether security concerns, or the lack of clear visibility on return of IoT investment, enterprise IoT adoption in Europe is being slowed down within European organisations, often unnecessarily so!

This session will consider the following proof of concept considerations:
• Building the IoT business case – where to focus your KPIs and metrics to show a meaningful IoT ROI
• Overcoming fears around weakened security via IoT implementation
• How to demonstrate IoT’s ability to drive efficiency up, and costs down whilst also bringing better asset management and quicker market delivery times
• Pinpoint how to measure process, product and customer-relationship enhancement benefits as a true and tangible ROI


Reserved for Platinum sponsors Wind River

Stream 1
IoT Technology Strategy

Stream 2
Engineering for IoT

10:05-10:35 – PANEL DISCUSSION: Winning Strategies to Monetise IoT

Selecting and connecting technologies is challenging for the best of us, but many organisations are still mired in the initial phase of evaluating the technologies and identifying the most profitable applications for implementation. For those who the is much advantage an organisation can gain from effective IoT adoption for increased revenue gains.

Join this interactive panel to hear:
• Establish how to create ‘real’ business objectives for IoT to show demonstrable ROI
• Generating innovation through effective data analytics for valuable insight and potential new services
• Putting together a strategy and getting buy-in from the most senior to technical levels within the organisation

10:05-10:35 – PANEL DISCUSSION: A To-do List for Future-Proofing your Smart Products

Connecting technologies and ensuring they work efficiently and securely in the years to come is a complicated task. During this discussion, a panel of experts will provide an exhaustive list of functionalities you should be enabling for successful go-to-market launches of smart products.

Areas for discussion and debate will include:
• Designing and building-in security to your smart product offerings
• Remote and manual update capabilities and, if manual, ease of updating process
• Ensuring high UX for improved usability and customer satisfaction
• Future-proofing your choice of connectivity and standards

10:35-11:05 – PRESENTATION: The Analytics of Things

The only way to realise the potential of IoT is through exhaustive data analytics. Even though analytics technologies are quite established already, IoT-specific analytics poses a double challenge for the enterprise as the technology is still at its infancy: both the data collection and the analysis part.

This interactive session will explore:
• The data challenge: How to transmit only valuable data
• The security challenge: How to protect the integrity of devices and sensitive data
• Analytics challenge: Identifying which specific data you should conduct analytics on and how best to filter the data
• Achieving seamless communication between devices, no matter the communication protocols

10:35-11:05 – PRESENTATION: Journeying to Valuable IoT Data Analytics

When entering a conversation around IoT ROI
• What is the right tech for IoT data analytics and how does that differ from just big data?
• Getting hold of the data; on premise Vs cloud
• Processing data streams
• Storage: accessing data in an easy indexable way
• What storage is best for the application you are running
• Generating intelligence from your data
• The importance of data visualisation

11:05-11:35 – Networking Break and 1-2-1 Meetings

Connectivity & Interoperability

11:35-12:05 – PANEL DISCUSSION: Choosing an IoT Connectivity Partner

Connectivity is of critical importance as it can make or break your IoT project. This means that choosing your connectivity partner is of equal important, and not a decision to be taken lightly.
This session will investigate the core essentials when choosing your connectivity partner, including:
• Understanding your connectivity options and how they perform in terms of quality and network reliability, battery life and cost
• Establishing a clear check-list of the key questions you should ask yourself and your providers when making your partner choice

11:35-12:25 – WORKSHOP: Understanding Your Connectivity Options

M2M has been around for years and the Telecom Operators have felt reasonably comfortable that they’d established themselves as the prime IoT connectivity providers. However, fresh players to the connectivity market have been emerging, offering alternate types of connectivity protocols and making this technology choice even more confusing!

Leave this session with a clear overview of what the different protocols are and which one is most suitable for your use case.

12:05-12:35 – PANEL DISCUSSION: Making Sense of IoT Connectivity

Deploying an IoT app on a global scale, to thousands of users, requires excellent communication provision.

Join this session to hear recommendations on:
• How to ensure that the stream of data will arrive at its destination every time and on-time?
• Committing to a network that doesn’t drain battery life and consumes the least power possible
• Understanding the importance of presence detection to prevent, or quickly fix, any failed connected devices
• How to minimise your expenditure on bandwidth?
• What guarantees should you be seeking from your provider: reliable, un-interrupted, bi-directional signalling?
• How to implement effective encryption across all devices and servers?

12:35-13:35 – Networking Lunch and 1-2-1 Meetings
12:25-13:25 – Networking Lunch and 1-2-1 Meetings
13:35-14:05 – PRESENTATION: Edge Computing & IoT

Analysts estimate that around 5.6 billion IoT devices will be performing analysis on the edge by 2020. It seems inevitable therefore, that enterprises need to take a closer look to the opportunities arising from this and how the technology can assist in improving productivity and efficiency.

This session will discuss the benefits & challenges of using the IoT for data storage and processing:
• Why is edge computing uniquely positioned for IoT?
• Overview of the opportunities of using edge computing
• How do you split local intelligence and in the cloud?
• What approach to take when both boxing architecture and running independently is an option?

13:25-14:15 – WORKSHOP: An Exhaustive ‘How-to’ on IoT Device Management

During this workshop, we will be examining device management closely, or more specifically, how to tackle device management in the context of IoT.

Join us to receive help and advice on:
• Streamlining the device management process for efficiency and scalability
• Patching and updating to tackle constant vulnerabilities
• How can you build over-the-air (OTA) manageability in the devices before being dispatched?
• Where else can OTA be applied?
• Securing the collection and transmission of data for storage and analytics
• How can communication be bi-directional and flexible to allow all network components to be connected, observed and able to communicate?

14:05-14:35 – PANEL DISCUSSION: Top Tips in Future-Proofing the IoT Investment

Realising the opportunity from your IoT can easily be hindered by poorly thought-through strategy and/or bad delivery. Consumers are often not very forgiving of poor functionality and, even if not fully appreciated initially, poor security.

Join this interactive session to get insights and recommendations from industry experts on:
• Ensuring longevity for the smart product
• Performing high security standards when there is a lack of security best practice
• What is the future of open standards and how to select?
• Realising the importance of being able to adapt quickly to new standards, devices and the need for integration


Hear technical insight and watch a demonstration – there is no better way to learn!

Demos will include:
APIs: How to leverage APIs. And connect the right standards and APIs
Service Platforms: How to build on different service platforms
Security: How to spot a potential breach and establishing effective disaster recovery and crisis management policies

14:35-15:00 – PRESENTATION: Becoming a Truly Digital Business with the Support of APIs

Join this session to hear more on how APIs can help you securely expose connected devices to customers, go-to-market channels, and other applications.

• How do you select a flexible, secure, and scalable API?
• Gaining better governance on the flow of data
• Guaranteeing the high performance required to connect your smart objects and environments
• How to you organise your API teams?

15:15-15:45 – PRESENTATION: What Should Good Testing Look Like in IoT?

When moving from design to implementation, robust testing is vital for success. But how can you ensure devices and apps live up to their expectations and perform at both an important level and securely?

Join this presentation to hear all this and more considered, including:
• How does Continuous Integration fit into an IoT development?
• How does dynamic testing expose code weaknesses and vulnerabilities that are not visible to static analysis?
• What tools are available for testers to help break the application during QA?
• Prevention is better than cure – Learning to identify traffic patterns and developing the ability to identify malicious traffic patterns

Cesare Garlati, Chief Security Strategist, Prpl Foundation

15:00-15:30 – PRESENTATION: Data Management Unlocks the Value of IoT

With the data universes constantly expanding, the need for increased storage and analysis capacity is critical. Data management challenges in IoT lie in two key areas – gathering data and obtaining meaningful insights, and this session will provide an overview of both, as well as advice on how to establish a strong data strategy.

• Gathering data: How and where is best to store your ‘big data’?
• Performing edge analytics to reduce the raw data transmission to the server
• Ensuring security of data flows
• Obtaining meaningful insights: performing real-time, batch and interactive analytics
• The importance of data visualisation

15:30-16:00 – Networking Break and 1-2-1 Meetings
15:45-16:15 – Networking Break and 1-2-1 Meetings
16:00-16:30 – PANEL DISCUSSION: IoT Standards and Ecosystems –  Key Standards & Certification Demands

The lack of standardisation is wildly accepted as slowing down enterprise IoT adoption, but are open standards suitable for every business? Even if the standards and ecosystems are not technologies, most materialise as APIs. These are essential as smart objects need to communicate and share information between them, and between different organisations. They will also need to be prepared to support multiple standards and APIs.

Join this discussion to hear:
• A balanced account of choosing between different standards for devices
• The advantages and disadvantages of both open and proprietary choices

16:15-17:00 – WORKSHOP: IoT Architecture – Creating Strong Foundations

This workshop will assess the key facets of an IoT architecture decision-making process, including:

• What are the architectures that need to be put in place to ensure compatibility?
• How do you scale up from device-to-device to achieve truly global IoT?
• How to use APIs to speed up innovation?
• How to achieve interface collaboration?

16:30-17:00- PRESENTATION: Safeguarding Your Reputation

Following the recent DDoS attacks, the public has suddenly become much more aware of the threat connected products can cause and are cautious of protecting their privacy. Furthermore, businesses need to consider their revenue and reputation, which can be directly harmed if such a threat becomes reality.

The industry is now pulling itself together to set standards and identify needs in the IoT product security. Join this session to hear about:
• Why security should be ‘designed-in’ from the very start of the process
• How to source intelligence and use it to protect your devices
• What security and certification is available and how can you use this for competitive advantage?
• What technologies can improve your security protection?
• How to tackle the lack of expertise; creating IoT security training products for the development teams

17:00-17:30 – Closing Keynote
PANEL DISCUSSION/PRESENTATION: Barriers to Enterprise-wide IoT Adoption and Navigating a Clearer Way Forward

During this closing address, we will consider all the barriers one could encounter when rolling-out your IoT implementation and how best to overcome these hurdles.

Key issues to be addressed will include:
• The issues around a lack of industry best practice to showcase revenue growth and reduced OpEx
• Dealing with the polyphony of standardisation options
• Tackling the lack of clarity around security best practice and customer privacy concerns
• How to achieve an optimal manipulation of data

17:30 – Close of Conference