Featured
Zero Trust– A Scalable Way to Secure IoT
Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr
Enough scouring through MAC and IP addresses—tell me what’s really on my network—what’s their role and what are they doing? How do I extend Zero Trust segmentation to secure devices at scale? In this session, you learn simple and efficient solutions to discover and secure every IoT asset on your network. This session will answer common concerns and questions such as:
Which devices are vulnerable and at risk? Are devices behaving as expected?
How can I quickly lock down threats and respond to the security notice de jour?
I am tired of my team playing whack-a-mole. What can I do to prevent attacks?
How can I leverage my existing network and security infrastructure to segment and protect IoT devices?
All episodes
-
Introduction to the Enterprise IoT Security Lifecycle
Darron Antill, CEO and Rao Cherukuri, CSO, Device Authority
The Internet of Things (IoT) presents a massive business opportunity across almost every industry. But to realize that opportunity, enterprise IoT security must become a primary focus. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the legal and safety consequences of compromised security.
Until now, security has been treated as an afterthought; by adding layers of security after devices are delivered, with infrastructure and applications already in place. But security for IoT is too important to be treated as an afterthought. IoT’s unique characteristics are also forcing a fundamental rethink about how Enterprises need to implement security management for devices and data.
The Enterprise IoT Security Blueprint was first introduced by Device Authority in April 2018 and has since evolved to incorporate further steps within the emerging Enterprise IoT state. This evolution is a result of technology innovation and exploring real world use cases in different industries which require robust security by design.
-
Building security within IoT devices:Security by design & supply chain integrity
Marc Canel, Imagination Technologies and Rob Dobson, Device Authority
IoT devices are typically built for a specific application. The user manages the binding of the device to its cloud application through error prone manual processes. This cumbersome and risky approach prevents large-scale adoption. Single purpose devices adds cost and complexity. It's an industry wide issue driven by the fragmentation of the IoT marketplace and the desire of actors for differentiation. This presentation will cover:
• The industry's need to find remedies to security and supply chain problems
• Industry wide collaboration to design protocols for provisioning and on-boarding
• The importance of removing manual and password driven operations -
IoT Security: What legislation, regulations and standards are important?
David Rogers, IoTSF and Paul de Curnou,Device Authority
In today's current landscape, when we talk about IoT devices we often hear about legislation, regulations, and standards to follow. There are general IoT security or cybersecurity laws, as well as industry specific regulations - such as HIPAA. These laws and regulations can also differ depending on your geographical location.
Join this session to decipher the new legislation, current regulations and standards to follow to ensure a safe and secure IoT world - whether you're building IoT products, developing IoT apps or processing vast amounts of data.
-
Protecting your IoT software delivery against malware insertion
Eddie Glenn, Venafi
In December 2020, it was reported that a software supply chain cyber-attack occurred against SolarWinds which caused infections in numerous businesses and government agencies. While complex in nature, this involved vulnerabilities in the build cycle at SolarWinds.
For an IoT manufacturer, securing your software supply chain and your build process is as critical as is securely delivering updates to your IoT devices. In this session, we’ll cover:
• A review of how SUNBURST was introduced into the software supply chain
• Steps that can be taken by software developers to minimize this from happening to you
• How digitally signing source code and other intermediate artifacts during your software build process can minimize these risks
• The benefits of securing a code signing process for your company -
Enterprise IoT Security – What you need to know
Nadir Izrael, Chief Technical Officer, Armis
IoT devices are everywhere, helping organizations collect real-time data and automate tasks for greater productivity and efficiency. The number of unmanaged devices are exponentially growing with the advent of Industry 4.0 / Digital transformation. This session will cover the exposures and threats associated with these devices.
If you’re responsible for threat management, or if your team has been discussing how to secure unmanaged assets and IoT devices, you don’t want to miss this session:
* State of Enterprise IoT Security
* Security challenges with unmanaged and IoT devices
* How to respond to these threats
* How to protect these devices from future attacks or breaches -
Automating Device Security at IoT Scale
Srinivas Akella - Founder and CTO, WootCloud and Rao Cherukuri, CSO, Device Authority
With the explosion in the number and types of connected devices lacking Security by Design architecture, developing rich device context is of critical importance to ensure network security and access control. There is also a growing regulatory demand to audit all devices on the network, for stronger device hygiene and access restrictions.
WootCloud’s award-winning ML/AI Hyper-Context Security Platform provides contextualized visibility and analytics for all devices, and uses this intelligence to segment the network, correlate threats and vulnerability propagation across interfaces and automate access control.
This interactive live session will demonstrate how WootCloud HyperContext® delivers a deep understanding of all devices entering/exiting your network. In addition, you will learn how HyperContext stitches together a comprehensive understanding of the risks and threats, and generates strong access control policies to automate device security at IoT scale.
Key Takeaways:
1. How to Detect, Inspect, Defend every device in your organization at IoT scale using device context.
2. Understand why HyperContext® is more powerful than the current fingerprinting solutions.
3. Automate access control and supercharge your existing security investments with strong integrations.
4. Understand why HyperContext® is an essential part of moving towards IoT platforms and Security by Design. -
Enabling Industry 4.0 and Digital Transformation by bridging IoT Security gaps
Mark Brown, David Mudd, and Isabel Forkin, BSI
With the acceleration of Industry 4.0, accompanied by the convergence of the Internet of Things (IoT) and Operational Technology (OT), systems can now be connected to corporate IT, the cloud and central management systems. The number of connected devices is predicted to rise to 75 billion by 2025, and with that expansion comes increased risk. As Organisations embrace digital transformation and evolve the new normal, they need to understand their accountability and responsibility for security in the ecosystem. This is particularly important in sectors like healthcare, where connect devices are used to monitor and treat patients and transmit sensitive data. This highlights the importance of the security and resilience of the devices, applications and the data they generate.
The session will cover:
* Explore the issue of IoT security across the asset lifecycle and the risks associated with exposed networks
* Look at accountability from planning and manufacture, to installation and disposal
* Explain how to ensure a robust system, manage business and technology cyber risks and achieve sustainable resilience in IoT -
Secure by Design: Identity, Provisioning and Automation is the Key to IoT
Brian Colgan, EPS Global; Kamal Khan, Intrinsic ID; Rob Dobson, Device Authority
Join an expert panel as we discuss what secure by design really means for IoT – throughout the supply chain. We’ll look at IoT device security including operational security management, zero touch provisioning, and automated device quarantining.
Are you building a new connected product, solution or service? How can you ensure trust is built in from the beginning?
Are you confident that the supply chain and device programming is secure? i.e. provisioning of firmware?
-
Managing the IoT device security lifecycle
Jon Coons, Microsoft, and James Penney, Device Authority
Learn about the steps required to connect production devices to IoT platforms/applications without human intervention, with a suitable environment for managing IoT devices throughout their security lifecycle.
-
Integrate IoT security in the Enterprise: Leverage existing security investments
Juan Asenjo, Entrust and Julio Merette, Device Authority
The majority of Enterprise IoT security implementations need to take existing IT security controls into account and seamlessly interoperate with IoT devices. The challenge is integrating IoT IAM with the traditional Enterprise IAM, Hardware Security Modules (HSMs), and Data Security Platforms.
• Enterprises use HSMs for Root of Trust, secure storage of keys, and secure crypto operations. HSMs are used for IoT identity provisioning and data security operations.
• Enterprises already use data security platforms for key management and policy-based data access authorization. Integration with these systems is essential for end-to-end data security and compliance. This is required for secure data exchange between IoT devices and other Enterprise resources including enterprise users.
• IoT IAM and Enterprise traditional IAM need to interoperate to authorize and share data between the IoT devices, Enterprise systems, and users.Join this session to hear from Device Authority and guest speakers on how to efficiently integrate IoT security in the Enterprise, while also leveraging existing security investments.
-
IoT Security Use Cases
Peter Morton, McLaren Automotive and Device Authority
IoT comes alive when we talk about real customer use cases. Firstly we look at the challenges or pain points they have, and provide a solution and explain how to do it. The main verticals we'll explore are Healthcare / Medical Devices, Industrial / Manufacturing, and Automotive.
-
The Role of IoT IAM in IoT Security: A market and analyst perspective
Divya Baranawal, Research Director, Quadrant Knowledge Solutions and Rao Cherukuri, CSO, Device Authority
Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.
This interactive session will focus on:
* Key capabilities of IoT IAM platforms to meet the requirements of IoT security
* Understand why IoT IAM is substantially different from Traditional IAM
* Current state of the market / vendors
* Market drivers and expected growth (importance of IoT IAM) -
Managing the Risks of Connected Medicine in the Real Time Health System
Stephan Goldberg, VP of Systems Engineering, Medigate
Health systems continue to push forward to capture the benefits of real time interoperability. Remarkably, many do so without detailed knowledge of what’s connected to their networks and/or how to size and implement rational, agile security measures. With IoMT spending growing at a CAGR of 20%, we’re witnessing a revolution in the way care will soon be delivered. This webinar will zero-in on the emerging challenges faced by HIT and HTM professionals. Asset management and cybersecurity convergence will be discussed, along with the latest solution advances and how they are unifying workflows to ensure practice scalability. Use-case demonstrations will be provided in this context.
-
Zero Trust– A Scalable Way to Secure IoT
Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr
Enough scouring through MAC and IP addresses—tell me what’s really on my network—what’s their role and what are they doing? How do I extend Zero Trust segmentation to secure devices at scale? In this session, you learn simple and efficient solutions to discover and secure every IoT asset on your network. This session will answer common concerns and questions such as:
Which devices are vulnerable and at risk? Are devices behaving as expected?
How can I quickly lock down threats and respond to the security notice de jour?
I am tired of my team playing whack-a-mole. What can I do to prevent attacks?
How can I leverage my existing network and security infrastructure to segment and protect IoT devices?