Hi [[ session.user.profile.firstName ]]

IoT Security Made Easy: How to implement secure code signing and update delivery

As the number of IoT devices & apps continues to grow, so does the need for secure code signing & update delivery.

Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

Join this webinar to:
• Learn why code signing is important, in particular for IoT
• Understand how CodeSign Protect helps organisations today
• Explore a demo of a practical implementation of code-signing and secure update delivery for IoT
Recorded Jul 15 2020 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eddie Glenn, Venafi and Nirmal Misra, Device Authority
Presentation preview: IoT Security Made Easy: How to implement secure code signing and update delivery

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Promise of IoT for Agile Factories of the Future Oct 14 2021 5:00 pm UTC 45 mins
    Lux Chakrapani, Director and Business Strategy Leader, Microsoft and Tyler Gannon, VP Strategic Alliances, Device Authority
    There are many challenges facing the manufacturing industry. A major hurdle is that enacting design changes in the production line is often difficult and time consuming. Factory layouts need to be more flexible to meet customer expectations of faster delivery and more customized products. This session will focus on how businesses worldwide are leveraging the power of connected/IoT devices to create operational visibility, increase productivity, and improve overall operations within Smart Factories.
  • Who's Playing with Your Food: Real-world IoT Threats to Food and Agriculture Oct 14 2021 1:00 pm UTC 45 mins
    Kristin Demoranville, Head of Cyber Risk and Advisory, Americas, BSI and Rob Dobson, VP Technology, Device Authority
    As businesses strive to become more sustainable and environmentally friendly, deployment of Internet of Things (IoT) technologies will increase within industrial and enterprise environments. Automation improvements and Artificial Intelligence (AI) will rely on IoT devices to monitor and report the state of farms, crops, factories, and livestock in real-time. The addition of all these internet-connected devices will create a considerable cybersecurity threat that most organizations are unprepared to handle or do not even know will become an issue.

    Investing in technology is step one to ensure cybersecurity resilience, but where should businesses invest first? Indeed, what updates to existing technology platforms are needed to improve organizational resilience?

    With the new Infrastructure Bill set to pass in the US Congress, an influx of money will enable organizations to strengthen, upgrade, and future-proof cybersecurity, whilst in Europe, ENISA has published guidelines for securing IoT. In the UK, the National Cyber Security Centre (NCSC) and the National Farmers Union (NFU) recently issued guidelines to help farmers combat cybersecurity in the agriculture sector. Regulations are helpful to create a common language, but often organizations are left with "where do we start" or "I don't know how to spend my budget effectively."

    In this webinar, Robert Dobson from Device Authority and Kristin Demoranville from BSI will get together for an informal conversation focusing on the new cybersecurity challenges faced for Industry 4.0, in particular, taking a look at food and agricultural organizations worldwide examining the need for security controls covering people, process and technologies.
  • Bring Your Own (Connected Car) Key: Security in the Automotive Industry Oct 13 2021 6:00 pm UTC 45 mins
    David Low, Worldwide Director of Professional Services, Entrust and Paul Lockley, VP Sales EMEA, Device Authority
    During this session, speakers from Entrust and Device Authority will outline how to secure your data, comply with regulatory and industry standards, and protect your organization’s reputation using best-in-class approaches for Key Management in the Automotive industry. We'll take a look at a customer, their challenges and how the solutions to overcome them.
  • The current state of the Industrial IoT (IIoT) and Cybersecurity Oct 13 2021 5:00 pm UTC 45 mins
    Tony Shakib, General Manager, Microsoft Azure IoT and Darron Antill, CEO, Device Authority
    The IIoT consists of internet-connected machinery and the advanced analytics platforms that process the data they produce. IIoT devices range from tiny environmental sensors to complex industrial robots. While the word “industrial” may call to mind warehouses, shipyards and factory floors, IIoT technologies hold a lot of promise for a diverse range of industries, including agriculture, healthcare, financial services, retail and advertising. During this session we'll take a look at how Industrial IoT is changing, what the latest use cases are and what challenges organisations are facing - with tips for how to solve or avoid them.
  • The role of AI in IoT security for preventing zero day attacks Oct 13 2021 4:00 pm UTC 45 mins
    Marc Canel, Imagination Technologies and James Penney, CTO, Device Authority
    Zero day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. Weakness can reside in the architecture at the device or system level, the implementation, the provisioning, the lifecycle management, the device or system administration. Learn how to prevent zero day attacks with technologies such as AI, utilising anomaly detection in IoT and other techniques.
  • Stop worrying and love SBOM – What is it? Why? How does it help you manage risk? Oct 13 2021 3:00 pm UTC 45 mins
    Rob Brown, Co-Founder & VP Marketing, Jitsuin, Will Godfrey, Jitsuin and Rob Dobson, Device Authority
    President Biden's Executive Order to improve cybersecurity directly relates to the trustworthiness and transparency in ALL digital infrastructure (IT, OT, IoT, IIoT). Anything that runs software is in scope – cloud services, on-prem application servers and connected things. Rogue or malfunctioning software is difficult to spot, and often stems from the lack of transparency in development of commercial software. A one-shot security evaluation or pentest is not enough – proof of security and safety must accompany any software throughout its useful lifespan. The Executive Order calls to equip federal users with a new defense that will deliver trust through transparency: the SBOM. This session will outline what an SBOM is and how it helps organisations to manage risk.
  • How to ensure Trust & Security for MCUs without TF-M, TPM or Secure Element chip Oct 13 2021 2:00 pm UTC 45 mins
    Hervé Roche, VP Marketing, Trusted Objects & Rob Dobson, VP Technology, Device Authority
    In this session Trusted Objects and Device Authority will discuss the alternatives for providing Root of Trust (RoT) on devices which don’t have MCUs with TF-M (TrustZone) nor a TPM or Secure Element chip. Alongside this the speakers will be discussing how coupling a software RoT with security automation makes Edge to Cloud possible for large scale IoT, including legacy IoT devices.
  • Challenges in the IoT journey and 5 easy steps to solve them Oct 13 2021 1:00 pm UTC 45 mins
    Patrick Nash, InVMA, Charlie Manners, InVMA and Paul Lockley, Device Authority
    Join this fireside chat with InVMA and Device Authority to learn about the real world challenges facing organisations on their IoT journey today. Find out about real insights and learn about potential solutions to improve your IoT project success and deliver ROI faster.
  • A snapshot into the unique challenges of Smart Cities and how to secure them Oct 12 2021 6:00 pm UTC 45 mins
    Khalil Yazdi, CSO, XIG and Tyler Gannon, VP Strategic Alliances, Device Authority
    Smart cities are no longer a concept or futuristic dream. Thanks to Internet of Things (IoT) solutions, many are already active and expanding rapidly. Municipal governments are leveraging cellular and Low Power Wide Area (LPWAN) wireless technologies to connect and improve infrastructure, efficiency, convenience, and quality of life for residents and visitors alike. But what are the key challenges of Smart Cities? That's what we'll look at during this session, and we'll touch upon a critical factor - security.
  • IoT and Cyber Insurance: why is it important and what are the challenges? Oct 12 2021 5:00 pm UTC 45 mins
    Rob Black, CISSP, Founder and Managing Principal, Fractional CISO
    The explosion of IoT devices is dramatically changing the cyber risk landscape — and not necessarily for the better. Many security experts believe that smart devices are creating a wave of vulnerabilities because they often lack strong — or, in some cases, even basic — security features. IoT devices often also lack regular product support, such as updates and patches, making them particularly vulnerable to newly discovered weaknesses.
  • What is the IoT edge and why is security important? Oct 12 2021 3:00 pm UTC 45 mins
    Steve Busby, Microsoft and James Penney, Device Authority
    The edge of the IoT is where the action is. It includes a wide array of sensors, actuators, and devices—those system end-points that interact with and communicate real-time data from smart products and services. From a security standpoint, data at the edge can be troublesome, especially when it’s being handled by different devices that might not be as secure as centralized or cloud-based systems. As the number of IoT devices grows, it’s imperative that IT understands the potential security issues and makes sure those systems can be secured.
  • An analyst insight into the current IoT IAM market Oct 12 2021 2:00 pm UTC 45 mins
    Divya Baranawal, Research Director, Quadrant Knowledge Solutions
    Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.

    This interactive session will focus on:
    * Key capabilities of IoT IAM platforms to meet the requirements of IoT security
    * Understand why IoT IAM is substantially different from Traditional IAM
    * Current state of the market / vendors
    * Market drivers and expected growth (importance of IoT IAM)
  • Introduction to the IoT Security Summit: Edge to Enterprise Oct 12 2021 1:00 pm UTC 45 mins
    Darron Antill, CEO, Device Authority
    The opening session for the virtual IoT Security Summit hosted by Device Authority with special guests throughout the 3 days. We'll provide an introduction to the theme of the event and provide an overview of what can be expected. Watch this space for special guests!
  • Zero Trust– A Scalable Way to Secure IoT Recorded: Feb 24 2021 52 mins
    Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr
    Enough scouring through MAC and IP addresses—tell me what’s really on my network—what’s their role and what are they doing? How do I extend Zero Trust segmentation to secure devices at scale? In this session, you learn simple and efficient solutions to discover and secure every IoT asset on your network. This session will answer common concerns and questions such as:

    Which devices are vulnerable and at risk? Are devices behaving as expected?
    How can I quickly lock down threats and respond to the security notice de jour?
    I am tired of my team playing whack-a-mole. What can I do to prevent attacks?
    How can I leverage my existing network and security infrastructure to segment and protect IoT devices?
  • Managing the Risks of Connected Medicine in the Real Time Health System Recorded: Feb 24 2021 45 mins
    Stephan Goldberg, VP of Systems Engineering, Medigate
    Health systems continue to push forward to capture the benefits of real time interoperability. Remarkably, many do so without detailed knowledge of what’s connected to their networks and/or how to size and implement rational, agile security measures. With IoMT spending growing at a CAGR of 20%, we’re witnessing a revolution in the way care will soon be delivered. This webinar will zero-in on the emerging challenges faced by HIT and HTM professionals. Asset management and cybersecurity convergence will be discussed, along with the latest solution advances and how they are unifying workflows to ensure practice scalability. Use-case demonstrations will be provided in this context.
  • The Role of IoT IAM in IoT Security: A market and analyst perspective Recorded: Feb 24 2021 43 mins
    Divya Baranawal, Research Director, Quadrant Knowledge Solutions and Rao Cherukuri, CSO, Device Authority
    Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.

    This interactive session will focus on:
    * Key capabilities of IoT IAM platforms to meet the requirements of IoT security
    * Understand why IoT IAM is substantially different from Traditional IAM
    * Current state of the market / vendors
    * Market drivers and expected growth (importance of IoT IAM)
  • IoT Security Use Cases Recorded: Feb 24 2021 24 mins
    Peter Morton, McLaren Automotive and Device Authority
    IoT comes alive when we talk about real customer use cases. Firstly we look at the challenges or pain points they have, and provide a solution and explain how to do it. The main verticals we'll explore are Healthcare / Medical Devices, Industrial / Manufacturing, and Automotive.
  • Integrate IoT security in the Enterprise: Leverage existing security investments Recorded: Feb 24 2021 58 mins
    Juan Asenjo, Entrust and Julio Merette, Device Authority
    The majority of Enterprise IoT security implementations need to take existing IT security controls into account and seamlessly interoperate with IoT devices. The challenge is integrating IoT IAM with the traditional Enterprise IAM, Hardware Security Modules (HSMs), and Data Security Platforms.

    • Enterprises use HSMs for Root of Trust, secure storage of keys, and secure crypto operations. HSMs are used for IoT identity provisioning and data security operations.
    • Enterprises already use data security platforms for key management and policy-based data access authorization. Integration with these systems is essential for end-to-end data security and compliance. This is required for secure data exchange between IoT devices and other Enterprise resources including enterprise users.
    • IoT IAM and Enterprise traditional IAM need to interoperate to authorize and share data between the IoT devices, Enterprise systems, and users.

    Join this session to hear from Device Authority and guest speakers on how to efficiently integrate IoT security in the Enterprise, while also leveraging existing security investments.
  • Managing the IoT device security lifecycle Recorded: Feb 24 2021 46 mins
    Jon Coons, Microsoft, and James Penney, Device Authority
    Learn about the steps required to connect production devices to IoT platforms/applications without human intervention, with a suitable environment for managing IoT devices throughout their security lifecycle.
  • Secure by Design: Identity, Provisioning and Automation is the Key to IoT Recorded: Feb 24 2021 45 mins
    Brian Colgan, EPS Global; Kamal Khan, Intrinsic ID; Rob Dobson, Device Authority
    Join an expert panel as we discuss what secure by design really means for IoT – throughout the supply chain. We’ll look at IoT device security including operational security management, zero touch provisioning, and automated device quarantining.

    Are you building a new connected product, solution or service? How can you ensure trust is built in from the beginning?

    Are you confident that the supply chain and device programming is secure? i.e. provisioning of firmware?
Trust for every Thing
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler.

IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IoT Security Made Easy: How to implement secure code signing and update delivery
  • Live at: Jul 15 2020 3:00 pm
  • Presented by: Eddie Glenn, Venafi and Nirmal Misra, Device Authority
  • From:
Your email has been sent.
or close