ATX West, MD&M West, Plastec West, West Pack, and Design & Manufacturing West is part of the Informa Markets Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Welcome to the Advanced Manufacturing West 2019 Presentation Store. Here you can view and download conference and/or show floor theater presentations before, during, and after the event. If you’re looking for a presentation from a specific session that you’re unable to find here, note that it’s likely because the presenter has not provided permission for external use or has not yet shared their presentation with us. Please check back after the event for a more complete catalogue of available presentations.

Leveraging IIoT without Compromising Data Privacy or Cyber Security

Tom Craven (VP of Product Strategy, RRAMAC Connected Systems)

Keary Donovan (Information Systems Consultant, Pathways 7)

Joe Hopper (President, Fracture Labs)

Location: 209A

Date: Wednesday, February 6

Time: 1:15pm - 2:15pm

Track: Smart Manufacturing Innovation Summit

Vault Recording: TBD

The Industrial Internet of Things (IIoT) can benefit your company by increasing productivity and reducing operating costs through leveraging seamless data flow between equipment and business systems. Companies utilizing the IIoT can provide real-time operational information to users via smart phone apps and text alerts. The IIoT also allows companies to access outside expertise, hosted data storage, software simulation, AI, and computing power. Leveraging external resources and expertise allow you to rapidly deploy cost-effective powerful solutions for predictive maintenance, overall equipment effectiveness (OEE), and machine learning, but how do you take advantage of IIoT benefits without compromising data privacy and cyber security? While there is no one-size-fits-all solution, there is a solution for nearly every industry and application.

Hear from privacy and security experts during this interactive roundtable session, and bring your own problems to the table for peer-to-peer problem solving.

Presentation File

Leveraging_IIoT_without_Compromising_Data_Privacy_or_Cyber_Security.pdf