InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How to protect IoT devices during manufacturing stage with secure provisioning

Presented by

Brian Colgan, EPS Global and Paul Lockley, Device Authority

About this talk

The Internet of Things (IoT) is transforming our homes, cars, hospitals, businesses and public spaces – mostly for the better – but without suitable precautions (security, privacy) IoT devices can be an attractive target for malicious actors and cyberattacks. When embarking on an IoT project, or designing a new connected device or product, it’s important to factor in security early on. The potential impact of an IoT security breach is forcing a suitable security model from the design and manufacturing phase which supports secure production; the secure provisioning of root keys and certificates at the time of manufacturing, secure mastering, and a foundation for secure updates. Join our webinar to learn more about: • The challenges and risks of IoT • The need for a Secure by Design approach • Guideline and solutions to mitigate the risks • Real world examples We are delighted to be joined by EPS Global. There will be an opportunity to ask the speakers questions during the live session. If you’re watching on demand and have a question, please email info@deviceauthority.com
Device Authority - IoT Security

Device Authority - IoT Security

6385 subscribers104 talks
Discovery, visibility and automated security
Device Authority enables end to end cyber resilience for connected devices through the discovery, visibility and automated security of large IoT/OT deployments. With device identities outnumbering human identities 82:1 in enterprise environments and as unmanaged devices become a major target for attack, Device Authority’s Discovery Tool and KeyScaler-as-a-Service (KSaaS) platform provide organizations with complete visibility and control of their device identities and vulnerabilities, reducing human error, accelerating incident response, minimizing risk, ensuring complete device and data trust, and enabling trusted AI in any connected environment.​
Related topics