Shadow Devices and Cybersecurity
Along with the burgeoning Internet of Things comes a new reality: billions of invisible devices connected to private networks. These “shadow devices” enlarge your attack surface and, if left in the dark, expose your organization to malware propagation and theft of critical resources.
In this webinar, Mr. Rothman defines the classes of shadow devices—everything from sensors to medical devices to industrial control systems—and discusses how to gain visibility and control of these potentially dangerous endpoints. In addition, he’ll talk about next-generation access control and the strategies and technologies that reveal shadow devices through:
• Visibility and risk profiling
• Controls to protect vulnerable agentless devices
• Automation and integration of existing security technologies
--
Mike Rothman, Analyst & President, Securosis, Inc. started his career as a programmer and a networking consultant. Today, he specializes in protecting networks and endpoints, security management, and compliance, or what he calls “the sexy aspects of security.” Mike is one of the most sought-after speakers and commentators in the security field and, after 20 years in the business, he’s one of the guys who “knows where the bodies are buried.”