InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Axonius #3: Navigating the Coming IoT Asset Visibility Gap

Presented by

Lenny Zeltser, CISO, Axonius; Nathan Burke, CMO, Axonius; Brandon Dunlap, Moderator

About this talk

As IT complexity increases at organizations, gaining visibility into a comprehensive asset inventory becomes progressively difficult for information security teams. The convergence of three trends account for this new era of complexity: the increase in the number and types of devices, rapid public cloud adoption, and the looming IoT explosion. Axonius commissioned a research survey with Enterprise Strategy Group (ESG) to uncover what kinds of visibility gaps, challenges, and strategies are top of mind for information security professionals. Join Axonius and (ISC)2 on May 21, 2020 at 1:00PM Eastern for the third of three webinars focusing on the looming and inevitable IoT explosion. By some reports, there will be 500 billion connected devices by 2030 (Cisco). Organizations are most concerned about visibility into the volume and diversity of devices. Webinar attendees will learn: • Detailed research findings on the looming IoT explosion, visibility challenges, and security implications • An understanding of the key asset inventory challenges and how organizations are addressing these issues • Best practices when implementing and improving an asset inventory process • Emerging innovations and approaches to continuous asset discovery and automation
ISC2 Security Briefings

ISC2 Security Briefings

191791 subscribers523 talks
ISC2 Security Briefings - In-depth examination of infosec topics.
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.
Related topics