Training

Endpoint Security , Geo Focus: Asia , Geo-Specific

Internet of Everything: Please Don't Connect It First and Secure It Later

Internet of Everything: Please Don't Connect It First and Secure It Later

The number of IoT devices will proliferate to over one trillion in the next few years, but any device that can communicate with another potentially can provide a direct conduit from the public Internet to some very private and valuable information. In our rush to connect everything together, secure connectivity and information handling is frequently an afterthought, if even a thought at all.

See Also: Expert Panel | Data Classification: The Foundation of Cybersecurity Compliance

Is it possible to instill sound SDL (security development lifecycle) practices into device manufacturers? Practices are improving, with more refinements on the way. But hope, as they say, is not a strategy. An alternative to waiting for built-in security to gestate is to bolt it on. Several gatekeeper on-boarding solutions exist for brokering the relationship between enterprise and device, limiting connectivity in controlled phases, and managing patch levels, authorization and connectivity to within acceptable limits.

The session will discuss:

  • Design philosophy for a future-ready secure IoT infrastructure
  • Contemporary strategies and technologies for securing IoT
  • The evolving attack landscape for IoT
  • What enterprise practitioners need to prepare for

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.