Ed TALKS: Are IoT & BYOD dead? Why Today we Live with the Enterprise of Things

Presented by

Ed Adams, Sec Innovation | Larry Whiteside Jr, CyberClan | Vandana Padmanabhan, stealth mode startup | Anil Mahale, Forescout

About this talk

The enterprise of things (EoT) encompasses all the "things" that get pulled into an enterprise's infrastructure. Not just IoT but also operational technology, office endpoints, WFH devices, and more. The 2020 rush to work-from-home, the proliferation of 5G, and an increased dependency on personal devices are burdening IT with a more diverse attack surface and devices that don't conform to corporate standards. Leaders need to adjust their cyber-risk-mitigation playbooks. Come listen to three industry experts discuss this hostile ecosystem and the defenses they've put in place to adapt. Topics include: - Securing the software that runs the Enterprise of Things - Managing risk in corporate networks where IP is no longer isolated - Evolving techniques in attack surface management and threat modeling - Practical tips for minimizing IoT data leaks and adopting zero trust - Managing device decay and non-standard configurations
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (71)
Subscribers (14825)
Security Innovation is an authority on software security and helps organizations build and deploy more secure software. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them. Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. We have been analyzing application vulnerabilities and risk for almost a decade and were one of the first providers of software risk solutions to Fortune 500 firms. Our unrivaled proficiency in technical analysis, coupled with sound knowledge of business processes, results in world-class solutions that bridge the gap between application security holes and risk management optimization.