Hi [[ session.user.profile.firstName ]]

Secure by Design: IoT Security Lifecycle Management with Microsoft Azure Sphere

Microsoft has developed a plethora of features and flexible interfaces for building IoT solutions with their Azure IoT platform. The rich set of components in Azure enable customers to adopt the right integration and policies as per their application requirements.

One of Microsoft’s latest additions, Azure Sphere, addresses an important Secure by Design foundation in IoT for devices, taking a step forward to help monitor security, and also provides a secure software update mechanism for these devices. This approach is solving a foundational challenge that we articulate in step 1 of our Enterprise IoT security model; secure production – where root keys are provisioned.

In this webinar you will learn about:
 The 7 properties of highly secure devices
 The importance of network security
 Steps to connect production devices to IoT platforms/applications without human intervention
 The environment for managing IoT devices through their security lifecycle

The webinar will include a short demonstration of Microsoft Azure Sphere and Device Authority KeyScaler.

Sign up today and watch live or on demand.


Who should attend?
This webinar is ideal for anyone starting or currently on their IoT journey, looking for guidance or advice on IoT security solutions that scale for hundreds, thousands or even millions of devices.

The level of content will be suitable for CXOs, VP, Head of, Product Managers, Security Managers, Solutions Architects, and Security Engineers.
Recorded Nov 4 2020 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Josh Nash, Microsoft and James Penney, Device Authority
Presentation preview: Secure by Design: IoT Security Lifecycle Management with Microsoft Azure Sphere

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Panel: Why is Device Trust important for IoT Data? Recorded: Oct 14 2021 47 mins
    Julie Roberts, CEO, Armored Things, Rob Curtin, Director, Higher Edu, Microsoft and Khalil Yazdi, Chief Strategy Officer, XIG
    Join this interactive panel session with special guests Julie Roberts from Armored Things and Rob Curtin from Microsoft. The session will be moderated by Khalil Yazdi of Crossroad Innovation Group and include topics such as:
    - New business models and capabilities within IoT
    - The importance of device trust for data trust
    - Unique challenges for harnessing information from disparate devices
    - Looking at IoT initiatives like smart cities, including large venues and university campuses
    - Considerations about personal data collection and how it’s used
  • The Promise of IoT for Agile Factories of the Future Recorded: Oct 14 2021 37 mins
    Lux Chakrapani, Director and Business Strategy Leader, Microsoft and Tyler Gannon, VP Strategic Alliances, Device Authority
    There are many challenges facing the manufacturing industry. A major hurdle is that enacting design changes in the production line is often difficult and time consuming. Factory layouts need to be more flexible to meet customer expectations of faster delivery and more customized products. This session will focus on how businesses worldwide are leveraging the power of connected/IoT devices to create operational visibility, increase productivity, and improve overall operations within Smart Factories.
  • Your Quickest and Safest Route to IoT Device Trust Recorded: Oct 14 2021 29 mins
    Ben Benson, Senior Technical Architect, Device Authority
    Learn how our managed service platform, KSaaS, can secure your IoT ecosystem without the burden of infrastructure of dedicated resources. Our KeyScaler-as-a-Service platform is evolving. Discover how KSaaS is the simplest, quickest, and most efficient way to implement industry-leading IoT device security without the initial outlay for complex infrastructure and specialised resources. KSaaS offers the full power of the KeyScaler platform and solutions, simply providing the intuitive interfaces you need to focus on what matters to you - device trust. Plus - a sneak preview of some of our roadmap developments, and how KSaaS can harness the power of Machine Learning with industry-wide device data to make your platform more intelligent, and more secure.
  • How eSIM Helps to Keep the IoT SAFE Recorded: Oct 14 2021 48 mins
    Ronald Weststrate​ - VP, Product Management CaaS and John Chambers - VP, Sales EAP, KORE
    From fleet to industrial equipment, smart meters, healthcare applications, and more, all types of industries can achieve substantial improvements using eSIM as part of their IoT ecosystem. With eSIM technology, you can leverage embedded connectivity that provides global coverage right out of the box and advanced auto-provisioning capabilities that ensure it’s always on the right network for your service needs.

    Join us as we discuss how you can install one SIM, one time – and enjoy coverage wherever it’s needed and connectivity that lasts the entire device lifecycle and take advantage of new IoT SAFE - Chip to Cloud security.
  • How to achieve compelling ROI in real IoT customer use cases Recorded: Oct 14 2021 28 mins
    Paul Lockley, VP Sales EMEA, and Tyler Gannon, VP Strategic Alliances, Device Authority
    Hear about 3 real customer use cases where significant ROI was delivered by implementing an automated, secure IoT strategy.
  • Who's Playing with Your Food: Real-world IoT Threats to Food and Agriculture Recorded: Oct 14 2021 55 mins
    Kristin Demoranville, Head of Cyber Risk and Advisory, Americas, BSI and Rob Dobson, VP Technology, Device Authority
    As businesses strive to become more sustainable and environmentally friendly, deployment of Internet of Things (IoT) technologies will increase within industrial and enterprise environments. Automation improvements and Artificial Intelligence (AI) will rely on IoT devices to monitor and report the state of farms, crops, factories, and livestock in real-time. The addition of all these internet-connected devices will create a considerable cybersecurity threat that most organizations are unprepared to handle or do not even know will become an issue.

    Investing in technology is step one to ensure cybersecurity resilience, but where should businesses invest first? Indeed, what updates to existing technology platforms are needed to improve organizational resilience?

    With the new Infrastructure Bill set to pass in the US Congress, an influx of money will enable organizations to strengthen, upgrade, and future-proof cybersecurity, whilst in Europe, ENISA has published guidelines for securing IoT. In the UK, the National Cyber Security Centre (NCSC) and the National Farmers Union (NFU) recently issued guidelines to help farmers combat cybersecurity in the agriculture sector. Regulations are helpful to create a common language, but often organizations are left with "where do we start" or "I don't know how to spend my budget effectively."

    In this webinar, Robert Dobson from Device Authority and Kristin Demoranville from BSI will get together for an informal conversation focusing on the new cybersecurity challenges faced for Industry 4.0, in particular, taking a look at food and agricultural organizations worldwide examining the need for security controls covering people, process and technologies.
  • Bring Your Own (Connected Car) Key: Security in the Automotive Industry Recorded: Oct 13 2021 25 mins
    David Low, Worldwide Director of Professional Services, Entrust and Paul Lockley, VP Sales EMEA, Device Authority
    During this session, speakers from Entrust and Device Authority will outline how to secure your data, comply with regulatory and industry standards, and protect your organization’s reputation using best-in-class approaches for Key Management in the Automotive industry. We'll take a look at a customer, their challenges and how the solutions to overcome them.
  • The current state of the Industrial IoT (IIoT) and Cybersecurity Recorded: Oct 13 2021 35 mins
    Tony Shakib, General Manager, Microsoft Azure IoT and Arjmand Samuel, Azure IoT Security Lead, Microsoft
    The IIoT consists of internet-connected machinery and the advanced analytics platforms that process the data they produce. IIoT devices range from tiny environmental sensors to complex industrial robots. While the word “industrial” may call to mind warehouses, shipyards and factory floors, IIoT technologies hold a lot of promise for a diverse range of industries, including agriculture, healthcare, financial services, retail and advertising. During this session we'll take a look at how Industrial IoT is changing, what the latest use cases are and what challenges organisations are facing - with tips for how to solve or avoid them.
  • The role of AI in IoT security for preventing zero day attacks Recorded: Oct 13 2021 41 mins
    Marc Canel, Imagination Technologies and James Penney, CTO, Device Authority
    Zero day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. Weakness can reside in the architecture at the device or system level, the implementation, the provisioning, the lifecycle management, the device or system administration. Learn how to prevent zero day attacks with technologies such as AI, utilising anomaly detection in IoT and other techniques.
  • Stop worrying and love SBOM – What is it? Why? How does it help you manage risk? Recorded: Oct 13 2021 40 mins
    Rob Brown, Co-Founder & VP Marketing, Jitsuin, Will Godfrey, Jitsuin and Rob Dobson, Device Authority
    President Biden's Executive Order to improve cybersecurity directly relates to the trustworthiness and transparency in ALL digital infrastructure (IT, OT, IoT, IIoT). Anything that runs software is in scope – cloud services, on-prem application servers and connected things. Rogue or malfunctioning software is difficult to spot, and often stems from the lack of transparency in development of commercial software. A one-shot security evaluation or pentest is not enough – proof of security and safety must accompany any software throughout its useful lifespan. The Executive Order calls to equip federal users with a new defense that will deliver trust through transparency: the SBOM. This session will outline what an SBOM is and how it helps organisations to manage risk.
  • How to ensure Trust & Security for MCUs without TF-M, TPM or Secure Element chip Recorded: Oct 13 2021 44 mins
    Hervé Roche, VP Marketing, Trusted Objects & Rob Dobson, VP Technology, Device Authority
    In this session Trusted Objects and Device Authority will discuss the alternatives for providing Root of Trust (RoT) on devices which don’t have MCUs with TF-M (TrustZone) nor a TPM or Secure Element chip. Alongside this the speakers will be discussing how coupling a software RoT with security automation makes Edge to Cloud possible for large scale IoT, including legacy IoT devices.
  • Challenges in the IoT journey and 5 easy steps to solve them Recorded: Oct 13 2021 32 mins
    Patrick Nash, InVMA, Charlie Manners, InVMA and Paul Lockley, Device Authority
    Join this fireside chat with InVMA and Device Authority to learn about the real world challenges facing organisations on their IoT journey today. Find out about real insights and learn about potential solutions to improve your IoT project success and deliver ROI faster.
  • Driving IoT security standards with FIDO Device Onboarding (FDO) Recorded: Oct 12 2021 36 mins
    Richard Kerslake, Intel and Amit Rao, Device Authority
    Today, the onboarding process for IoT devices is usually done manually by a technician – a process that is slow, expensive, and insecure. Industry sources have said that it is not uncommon for the cost of installation and setup to exceed the cost of the device itself. Although multiple companies have worked to automate the onboarding process, there wasn’t a widely accepted industry standard. Also, many proprietary solutions that do exist require that the end customer be known at the time of the device manufacture so that the device can be pre-configured. This creates friction and cost in the supply chain.

    The FIDO Alliance stepped up in the summer of 2019 to address this industry challenge. With its broad membership of leading cloud service providers, semiconductor companies and security companies, the Alliance is well positioned to bring together those that create and supply the technologies in the IoT ecosystem. The FIDO Alliance formed its IoT Technical Working Group (IoT TWG) with these stakeholders to define a new standard for automated, secure IoT onboarding. Less than 2 years after the working group formed, the FIDO Alliance released to the industry the FIDO Device Onboarding (FDO) specification.

    Join this session to understand:
    - What FDO is
    - Why it has been developed
    - Who are the ecosystem vendors and key implementers
    - How Device Authority has implemented FDO in our KeyScaler platform
  • A snapshot into the unique challenges of Smart Cities and how to secure them Recorded: Oct 12 2021 39 mins
    Khalil Yazdi, Chief Strategy Officer, XIG and Tyler Gannon, VP Strategic Alliances, Device Authority
    Smart cities are no longer a concept or futuristic dream. Thanks to Internet of Things (IoT) solutions, many are already active and expanding rapidly. Municipal governments are leveraging cellular and Low Power Wide Area (LPWAN) wireless technologies to connect and improve infrastructure, efficiency, convenience, and quality of life for residents and visitors alike. But what are the key challenges of Smart Cities? That's what we'll look at during this session, and we'll touch upon a critical factor - security.
  • IoT and Cyber Insurance: why is it important and what are the challenges? Recorded: Oct 12 2021 46 mins
    Rob Black, CISSP, Founder and Managing Principal, Fractional CISO
    The explosion of IoT devices is dramatically changing the cyber risk landscape — and not necessarily for the better. Many security experts believe that smart devices are creating a wave of vulnerabilities because they often lack strong — or, in some cases, even basic — security features. IoT devices often also lack regular product support, such as updates and patches, making them particularly vulnerable to newly discovered weaknesses.
  • Kubernetes at the Edge of Manufacturing Recorded: Oct 12 2021 46 mins
    Matt Bates, CTO and Co-founder Jetstack, and James Penney, CTO, Device Authority
    Bringing more and more intelligence close to the manufacturing floor brings new levels of agility and product innovation. Kubernetes is the operating system for today’s cloud-native generation, and the right fit to bring powerful compute, analytics, and automation right to the factory floor. Extending capabilities once only reserved for the cloud next to assembly line means that identity is critical. Good news: Building in machine identity for your devices at the Edge closest to your production is simpler, faster, easier than ever before with Kubernetes. Learn how Kubernetes and CNCF Sandbox project cert-manager are bringing machine identity that’s shockingly simple and ready to scale.
  • What is the IoT edge and why is security important? Recorded: Oct 12 2021 49 mins
    Steve Busby, Microsoft and James Penney, Device Authority
    The edge of the IoT is where the action is. It includes a wide array of sensors, actuators, and devices—those system end-points that interact with and communicate real-time data from smart products and services. From a security standpoint, data at the edge can be troublesome, especially when it’s being handled by different devices that might not be as secure as centralized or cloud-based systems. As the number of IoT devices grows, it’s imperative that IT understands the potential security issues and makes sure those systems can be secured.
  • An analyst insight into the current IoT IAM market Recorded: Oct 12 2021 34 mins
    Divya Baranawal, Research Director, Quadrant Knowledge Solutions
    Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.

    This interactive session will focus on:
    * Key capabilities of IoT IAM platforms to meet the requirements of IoT security
    * Understand why IoT IAM is substantially different from Traditional IAM
    * Current state of the market / vendors
    * Market drivers and expected growth (importance of IoT IAM)
  • Introduction to the IoT Security Summit: Edge to Enterprise Recorded: Oct 12 2021 38 mins
    Darron Antill, CEO, Device Authority and Kevin Bocek, VP Security Strategy & Threat Intelligence, Venafi
    The opening session for the virtual IoT Security Summit hosted by Device Authority with special guests throughout the 3 days. We'll provide an introduction to the theme of the event and provide an overview of what can be expected. We'll be joined by special guest, Kevin Bocek, VP Security Strategy & Threat Intelligence at Venafi.
  • Zero Trust– A Scalable Way to Secure IoT Recorded: Feb 24 2021 52 mins
    Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr
    Enough scouring through MAC and IP addresses—tell me what’s really on my network—what’s their role and what are they doing? How do I extend Zero Trust segmentation to secure devices at scale? In this session, you learn simple and efficient solutions to discover and secure every IoT asset on your network. This session will answer common concerns and questions such as:

    Which devices are vulnerable and at risk? Are devices behaving as expected?
    How can I quickly lock down threats and respond to the security notice de jour?
    I am tired of my team playing whack-a-mole. What can I do to prevent attacks?
    How can I leverage my existing network and security infrastructure to segment and protect IoT devices?
Trust for every Thing
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler.

IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Secure by Design: IoT Security Lifecycle Management with Microsoft Azure Sphere
  • Live at: Nov 4 2020 4:00 pm
  • Presented by: Josh Nash, Microsoft and James Penney, Device Authority
  • From:
Your email has been sent.
or close