- Investor Relations
- Careers
- Blog
-
-
- Algeria
- Angola
- Benin
- Botswana
- Burkina Faso
- Burundi
- Cabo Verde
- Cameroon
- Central African Republic
- Chad
- Comoros
- Congo, Democratic Republic of the
- Cote d'Ivoire
- Djibouti
- Equatorial Guinea
- Eritrea
- Eswatini
- Ethiopia
- Gabon
- Gambia
- Ghana
- Guinea
- Guinea-Bissau
- Kenya
- Lesotho
- Liberia
- Libya
- Madagascar
- Malawi
- Mali
- Mauritania
- Mauritius
- Morocco
- Mozambique
- Namibia
- Niger
- Nigeria
- Rwanda
- São Tomé and Principe
- Senegal
- Seychelles
- Sierra Leone
- Somalia
- South Africa
- South Sudan
- Sudan
- Tanzania
- Togo
- Tunisia
- Uganda
- Zambia
- Zimbabwe
-
-
-
-
Itron Customers
Access Orders, Product Knowledge & Support
-
Itron Partners
Grow your business with Itron's Tools, Training & Technology
How do you want to primarily partner with Itron?
-
Itron Suppliers
Access Problem Solving Tools, Reports & Analysis
-
Trouble Signing In?View FAQ
-
-

itron sessions
Security Framework for Next Generation in AMI 2.0
A set of new security challenges need to be considered with the introduction of AMI 2.0. AMI 2.0 brings with it an expanded set of use cases that goes beyond meter-to-cash and into grid management. AMI 2.0 meters are full-blown computers with their own Linux container environments and app-delivery models. Private cellular plays a bigger role in many deployment plans and peer-to-peer as well as behind-the-meter are new traffic patterns to secure. This session will provide a big picture view of security in AMI 2.0 and provide a framework of tools that can be applied to enforce it.