BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20180311T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20171105T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20171102T225421Z
UID:FB5E6BA7-9D4C-11E7-8752-0050568D2FB3
DTSTART;TZID=America/New_York:20171114T190000
DTEND;TZID=America/New_York:20171114T203000
DESCRIPTION:Cybe\n\nIEEE WNC section and the Local Consultants Network\n\nP
 resents:\n\n“Cybersecurity and the Internet of Things”\n\nBy: Charles 
 J. Lord\, PE\n\nTuesday November 14th\, 2017\, 7PM\n\nUNCA Campus\,\n\nRho
 ades Robinson Hall\, Rm 125\n\nDoor Prize Drawing\n\nWe will meet for dinn
 er at 5:30 pm in Brown Hall\n\nEveryone is invited\n\nGuests are welcome\n
 \nProgram:\n\nTens of billions nodes. Millions of terabytes data. The Inte
 rnet of Things (IoT) holds much promise for helping to automate much of ou
 r world as well as making us work smarter and more efficiently.\n\nUnfortu
 nately\, those billions of nodes and exabytes of data are each a potential
  security risk that can potentially bring much of the network down and wre
 ak havoc.\n\nTherefore\, designers of all elements of the IoT need to cons
 ider security as part of the design and implementation of the IoT.\n\nWe w
 ill take a look at where the security issues exist and what can be done in
  the design\, test\, installation\, and maintenance of IoT components to m
 inimize those risks. Some of the topics to be covered include:\n\n- the hi
 story and structure of the Internet of Things (IoT) and where the known se
 curity issues lie. We will look at a couple of examples of recent security
  breaches and how they could have been prevented. We will also look at the
  standards and regulatory issues surrounding (and mandating) IoT security.
 \n- hardware security needs – from code protection to guarding against u
 nauthorized board modification. We will look at many of the features that 
 are being added to high-security microcontrollers in order to meet these c
 hallenges\n- the security and vulnerabilities of data within the IoT. We w
 ill cover issues from the collection and reporting of incorrect or unrelia
 ble (“tainted”) data to keeping the data secure and intact as it trave
 ls throughout the network and to/from the cloud.\n- the challenges of over
 all network security. We will cover everything from secure communications 
 protocols to secure commissioning and decommissioning of nodes.\n- the oth
 er issues that we may face\, including the #1 security weakness in essenti
 ally every IoT implementation. We will look at some of the tools and test 
 methods available for IoT security.\n\nCampus parking permits are required
 . A free permit is available on the IEEE WNC website. Under announcements 
 sites.ieee.org/wnc\n\nIf you do not have a permit you can call the campus 
 police at 828-251-6710 and register your vehicle when you get on campus.\n
 \nDoor Prize Drawing\n\nThere will be a door prize drawing at the start of
  the meeting.\n\nMust be present to win\n\nSpeaker(s): Charles Lord\, \, C
 harles Lord\, \n\nAgenda: \n5:30 pm meet for dinner in Brown Hall\, Campus
  cafeteria\n\n7:00 PM presentation begins\n\nRoom: Room 125\, Bldg: Rhoade
 s Robinson Hall (RRO) \, UNCA  Campus\, Asheville\, North Carolina\, Unite
 d States\, 28804
LOCATION:Room: Room 125\, Bldg: Rhoades Robinson Hall (RRO) \, UNCA  Campus
 \, Asheville\, North Carolina\, United States\, 28804
ORGANIZER:c.j.lord@ieee.org
SEQUENCE:2
SUMMARY:IEEE WNC section presents: Cybersecurity and the Internet of Things
 \, Nov. 14\, 2017
URL;VALUE=URI:https://events.vtools.ieee.org/m/47171
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Cybe&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\; text-ali
 gn: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-size: 18pt\;&quot;
 &gt;IEEE WNC section and the Local Consultants Network&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;
 margin: 0px\; text-align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0p
 x\; font-size: 18pt\;&quot;&gt;Presents:&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\; text-
 align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-size: 18pt
 \;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\; text-align: center\;&quot; alig
 n=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-size: 24pt\;&quot;&gt;&amp;ldquo\;Cybersecu
 rity and the Internet of Things&amp;rdquo\;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\
 ; text-align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-siz
 e: 18pt\;&quot;&gt;By: Charles J. Lord\, PE&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\; te
 xt-align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-size: 1
 8pt\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\; text-align: center\;&quot; a
 lign=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-size: 18pt\;&quot;&gt;Tuesday Novemb
 er 14&lt;sup&gt;th&lt;/sup&gt;\, 2017\,&lt;span style=&quot;margin: 0px\;&quot;&gt;&amp;nbsp\; &lt;/span&gt;7PM&lt;
 /span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\; text-align: center\;&quot; align=&quot;center&quot;&gt;&lt;
 span style=&quot;margin: 0px\; font-size: 18pt\;&quot;&gt;UNCA Campus\, &lt;/span&gt;&lt;/p&gt;\n&lt;p
  style=&quot;margin: 0px\; text-align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;ma
 rgin: 0px\; font-size: 18pt\;&quot;&gt;Rhoades Robinson Hall\, Rm 125&lt;/span&gt;&lt;/p&gt;\n
 &lt;p style=&quot;margin: 0px\; text-align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;
 margin: 0px\; font-size: 18pt\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px
 \; text-align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-si
 ze: 14pt\;&quot;&gt;Door Prize Drawing&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\; text-al
 ign: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-size: 14pt\;
 &quot;&gt;We will meet for dinner at 5:30 pm in Brown Hall&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;m
 argin: 0px\; text-align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px
 \; font-size: 14pt\;&quot;&gt;Everyone is invited&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0p
 x\; text-align: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-s
 ize: 14pt\;&quot;&gt;Guests are welcome&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\; text-a
 lign: center\;&quot; align=&quot;center&quot;&gt;&lt;span style=&quot;margin: 0px\; font-size: 18pt\
 ;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;u&gt;&lt;span style=&quot;margin: 0px\; font-size: 14pt\;&quot;
 &gt;Program:&lt;/span&gt;&lt;/u&gt;&lt;/p&gt;\n&lt;p&gt;&lt;span style=&quot;font-family: Calibri\; font-size
 : medium\;&quot;&gt;Tens of billions nodes. Millions of terabytes data. The Intern
 et of Things (IoT) holds much promise for helping to automate much of our 
 world as well as making us work smarter and more efficiently. &lt;/span&gt;&lt;/p&gt;\
 n&lt;p&gt;&lt;span style=&quot;font-family: Calibri\; font-size: medium\;&quot;&gt;Unfortunately
 \, those billions of nodes and exabytes of data are each a potential secur
 ity risk that can potentially bring much of the network down and wreak hav
 oc. &lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;span style=&quot;font-family: Calibri\; font-size: medium\
 ;&quot;&gt;Therefore\, designers of all elements of the IoT need to consider secur
 ity as part of the design and implementation of the IoT. &lt;/span&gt;&lt;/p&gt;\n&lt;p&gt;&lt;
 span style=&quot;font-family: Calibri\; font-size: medium\;&quot;&gt;We will take a loo
 k at where the security issues exist and what can be done in the design\, 
 test\, installation\, and maintenance of IoT components to minimize those 
 risks. Some of the topics to be covered include:&lt;/span&gt;&lt;/p&gt;\n&lt;ul style=&quot;ma
 rgin-top: 0in\;&quot; type=&quot;disc&quot;&gt;\n&lt;li style=&quot;margin: 0px 0px 13px -20px\; col
 or: #000000\; line-height: 115%\; font-family: &#39;Calibri&#39;\,sans-serif\; fon
 t-size: 11pt\; font-style: normal\; font-weight: normal\;&quot;&gt;&lt;span style=&quot;ma
 rgin: 0px\; font-family: &#39;Palatino Linotype&#39;\,serif\;&quot;&gt;the history and str
 ucture of the Internet of Things (IoT) and where the known security issues
  lie. We will look at a couple of examples of recent security breaches and
  how they could have been prevented. We will also look at the standards an
 d regulatory issues surrounding (and mandating) IoT security.&lt;/span&gt;&lt;/li&gt;\
 n&lt;li style=&quot;margin: 0px 0px 13px -20px\; color: #000000\; line-height: 115
 %\; font-family: &#39;Calibri&#39;\,sans-serif\; font-size: 11pt\; font-style: nor
 mal\; font-weight: normal\;&quot;&gt;&lt;span style=&quot;margin: 0px\; font-family: &#39;Pala
 tino Linotype&#39;\,serif\;&quot;&gt;hardware security needs &amp;ndash\; from code protec
 tion to guarding against unauthorized board modification. We will look at 
 many of the features that are being added to high-security microcontroller
 s in order to meet these challenges&lt;/span&gt;&lt;/li&gt;\n&lt;li style=&quot;margin: 0px 0p
 x 13px -20px\; color: #000000\; line-height: 115%\; font-family: &#39;Calibri&#39;
 \,sans-serif\; font-size: 11pt\; font-style: normal\; font-weight: normal\
 ;&quot;&gt;&lt;span style=&quot;margin: 0px\; font-family: &#39;Palatino Linotype&#39;\,serif\;&quot;&gt;t
 he security and vulnerabilities of data within the IoT. We will cover issu
 es from the collection and reporting of incorrect or unreliable (&amp;ldquo\;t
 ainted&amp;rdquo\;) data to keeping the data secure and intact as it travels t
 hroughout the network and to/from the cloud.&lt;/span&gt;&lt;/li&gt;\n&lt;li style=&quot;margi
 n: 0px 0px 13px -20px\; color: #000000\; line-height: 115%\; font-family: 
 &#39;Calibri&#39;\,sans-serif\; font-size: 11pt\; font-style: normal\; font-weight
 : normal\;&quot;&gt;&lt;span style=&quot;margin: 0px\; font-family: &#39;Palatino Linotype&#39;\,s
 erif\;&quot;&gt;the challenges of overall network security. We will cover everythi
 ng from secure communications protocols to secure commissioning and decomm
 issioning of nodes.&lt;/span&gt;&lt;/li&gt;\n&lt;li style=&quot;margin: 0px 0px 13px -20px\; c
 olor: #000000\; line-height: 115%\; font-family: &#39;Calibri&#39;\,sans-serif\; f
 ont-size: 11pt\; font-style: normal\; font-weight: normal\;&quot;&gt;&lt;span style=&quot;
 margin: 0px\; font-family: &#39;Palatino Linotype&#39;\,serif\;&quot;&gt;the other issues 
 that we may face\, including the #1 security weakness in essentially every
  IoT implementation. We will look at some of the tools and test methods av
 ailable for IoT security.&lt;/span&gt;&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p style=&quot;margin: 0px\;&quot;&gt;&lt;sp
 an style=&quot;margin: 0px\; font-family: &#39;Palatino Linotype&#39;\,serif\;&quot;&gt;&lt;span s
 tyle=&quot;font-size: medium\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0p
 x\;&quot;&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\;&quot;&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p style=&quot;margin: 
 0px\;&quot;&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;margin
 : 0px\; color: #666666\; font-family: &#39;Arial&#39;\,sans-serif\; font-size: 12p
 t\;&quot;&gt;&lt;span style=&quot;font-size: 14pt\;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;text-decoration:
  underline\;&quot;&gt;Campus parking permits are required.&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt; 
 A free permit is available on the IEEE WNC website. Under announcements&lt;sp
 an style=&quot;margin: 0px\;&quot;&gt;&amp;nbsp\;&amp;nbsp\; &lt;/span&gt;sites.ieee.org/wnc&lt;/span&gt;&lt;/
 p&gt;\n&lt;p style=&quot;margin: 0px\;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;margin: 0px\; color: #
 666666\; font-family: &#39;Arial&#39;\,sans-serif\; font-size: 12pt\;&quot;&gt;If you do n
 ot have a permit you can call the campus police at 828-251-6710 and regist
 er your vehicle when you get on campus.&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\
 ;&quot;&gt;&lt;span lang=&quot;EN&quot; style=&quot;margin: 0px\; color: #666666\; font-family: &#39;Ari
 al&#39;\,sans-serif\; font-size: 12pt\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;&lt;/p&gt;\n&lt;p style=&quot;margin:
  0px\;&quot;&gt;&lt;u&gt;&lt;span lang=&quot;EN&quot; style=&quot;margin: 0px\; color: #666666\; font-fami
 ly: &#39;Arial&#39;\,sans-serif\; font-size: 14pt\;&quot;&gt;Door Prize Drawing&lt;/span&gt;&lt;/u&gt;
 &lt;u&gt;&lt;/u&gt;&lt;/p&gt;\n&lt;p style=&quot;margin: 0px\;&quot;&gt;&lt;span style=&quot;margin: 0px\; font-fami
 ly: &#39;Palatino Linotype&#39;\,serif\;&quot;&gt;&lt;span style=&quot;font-size: medium\;&quot;&gt;There 
 will be a door prize drawing at the start of the meeting.&lt;/span&gt;&lt;/span&gt;&lt;/p
 &gt;\n&lt;p style=&quot;margin: 0px\;&quot;&gt;&lt;span style=&quot;margin: 0px\; font-family: &#39;Palat
 ino Linotype&#39;\,serif\;&quot;&gt;&lt;span style=&quot;font-size: medium\;&quot;&gt;Must be present 
 to win&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;5:30 pm meet for dinn
 er in Brown Hall\, Campus cafeteria&lt;/p&gt;\n&lt;p&gt;7:00 PM presentation begins&lt;/p
 &gt;
END:VEVENT
END:VCALENDAR

