Hi [[ session.user.profile.firstName ]]

Introduction to the Enterprise IoT Security Lifecycle

The Internet of Things (IoT) presents a massive business opportunity across almost every industry. But to realize that opportunity, enterprise IoT security must become a primary focus. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the legal and safety consequences of compromised security.

Until now, security has been treated as an afterthought; by adding layers of security after devices are delivered, with infrastructure and applications already in place. But security for IoT is too important to be treated as an afterthought. IoT’s unique characteristics are also forcing a fundamental rethink about how Enterprises need to implement security management for devices and data.

The Enterprise IoT Security Blueprint was first introduced by Device Authority in April 2018 and has since evolved to incorporate further steps within the emerging Enterprise IoT state. This evolution is a result of technology innovation and exploring real world use cases in different industries which require robust security by design.
Recorded Feb 23 2021 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Darron Antill, CEO and Rao Cherukuri, CSO, Device Authority
Presentation preview: Introduction to the Enterprise IoT Security Lifecycle

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Promise of IoT for Agile Factories of the Future Oct 14 2021 5:00 pm UTC 45 mins
    Lux Chakrapani, Director and Business Strategy Leader, Microsoft and Tyler Gannon, VP Strategic Alliances, Device Authority
    There are many challenges facing the manufacturing industry. A major hurdle is that enacting design changes in the production line is often difficult and time consuming. Factory layouts need to be more flexible to meet customer expectations of faster delivery and more customized products. This session will focus on how businesses worldwide are leveraging the power of connected/IoT devices to create operational visibility, increase productivity, and improve overall operations within Smart Factories.
  • Your Quickest and Safest Route to IoT Device Trust Oct 14 2021 4:00 pm UTC 45 mins
    Ben Benson, Senior Technical Architect, Device Authority
    Learn how our managed service platform, KSaaS, can secure your IoT ecosystem without the burden of infrastructure of dedicated resources. Our KeyScaler-as-a-Service platform is evolving. Discover how KSaaS is the simplest, quickest, and most efficient way to implement industry-leading IoT device security without the initial outlay for complex infrastructure and specialised resources. KSaaS offers the full power of the KeyScaler platform and solutions, simply providing the intuitive interfaces you need to focus on what matters to you - device trust. Plus - a sneak preview of some of our roadmap developments, and how KSaaS can harness the power of Machine Learning with industry-wide device data to make your platform more intelligent, and more secure.
  • How to achieve compelling ROI in real IoT customer use cases Oct 14 2021 2:00 pm UTC 45 mins
    Paul Lockley, VP Sales EMEA, and Tyler Gannon, VP Strategic Alliances, Device Authority
    Hear about 3 real customer use cases where significant ROI was delivered by implementing an automated, secure IoT strategy.
  • Who's Playing with Your Food: Real-world IoT Threats to Food and Agriculture Oct 14 2021 1:00 pm UTC 45 mins
    Kristin Demoranville, Head of Cyber Risk and Advisory, Americas, BSI and Rob Dobson, VP Technology, Device Authority
    As businesses strive to become more sustainable and environmentally friendly, deployment of Internet of Things (IoT) technologies will increase within industrial and enterprise environments. Automation improvements and Artificial Intelligence (AI) will rely on IoT devices to monitor and report the state of farms, crops, factories, and livestock in real-time. The addition of all these internet-connected devices will create a considerable cybersecurity threat that most organizations are unprepared to handle or do not even know will become an issue.

    Investing in technology is step one to ensure cybersecurity resilience, but where should businesses invest first? Indeed, what updates to existing technology platforms are needed to improve organizational resilience?

    With the new Infrastructure Bill set to pass in the US Congress, an influx of money will enable organizations to strengthen, upgrade, and future-proof cybersecurity, whilst in Europe, ENISA has published guidelines for securing IoT. In the UK, the National Cyber Security Centre (NCSC) and the National Farmers Union (NFU) recently issued guidelines to help farmers combat cybersecurity in the agriculture sector. Regulations are helpful to create a common language, but often organizations are left with "where do we start" or "I don't know how to spend my budget effectively."

    In this webinar, Robert Dobson from Device Authority and Kristin Demoranville from BSI will get together for an informal conversation focusing on the new cybersecurity challenges faced for Industry 4.0, in particular, taking a look at food and agricultural organizations worldwide examining the need for security controls covering people, process and technologies.
  • Bring Your Own (Connected Car) Key: Security in the Automotive Industry Oct 13 2021 6:00 pm UTC 45 mins
    David Low, Worldwide Director of Professional Services, Entrust and Paul Lockley, VP Sales EMEA, Device Authority
    During this session, speakers from Entrust and Device Authority will outline how to secure your data, comply with regulatory and industry standards, and protect your organization’s reputation using best-in-class approaches for Key Management in the Automotive industry. We'll take a look at a customer, their challenges and how the solutions to overcome them.
  • The current state of the Industrial IoT (IIoT) and Cybersecurity Oct 13 2021 5:00 pm UTC 45 mins
    Tony Shakib, General Manager, Microsoft Azure IoT and Darron Antill, CEO, Device Authority
    The IIoT consists of internet-connected machinery and the advanced analytics platforms that process the data they produce. IIoT devices range from tiny environmental sensors to complex industrial robots. While the word “industrial” may call to mind warehouses, shipyards and factory floors, IIoT technologies hold a lot of promise for a diverse range of industries, including agriculture, healthcare, financial services, retail and advertising. During this session we'll take a look at how Industrial IoT is changing, what the latest use cases are and what challenges organisations are facing - with tips for how to solve or avoid them.
  • The role of AI in IoT security for preventing zero day attacks Oct 13 2021 4:00 pm UTC 45 mins
    Marc Canel, Imagination Technologies and James Penney, CTO, Device Authority
    Zero day is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. Weakness can reside in the architecture at the device or system level, the implementation, the provisioning, the lifecycle management, the device or system administration. Learn how to prevent zero day attacks with technologies such as AI, utilising anomaly detection in IoT and other techniques.
  • Stop worrying and love SBOM – What is it? Why? How does it help you manage risk? Oct 13 2021 3:00 pm UTC 45 mins
    Rob Brown, Co-Founder & VP Marketing, Jitsuin, Will Godfrey, Jitsuin and Rob Dobson, Device Authority
    President Biden's Executive Order to improve cybersecurity directly relates to the trustworthiness and transparency in ALL digital infrastructure (IT, OT, IoT, IIoT). Anything that runs software is in scope – cloud services, on-prem application servers and connected things. Rogue or malfunctioning software is difficult to spot, and often stems from the lack of transparency in development of commercial software. A one-shot security evaluation or pentest is not enough – proof of security and safety must accompany any software throughout its useful lifespan. The Executive Order calls to equip federal users with a new defense that will deliver trust through transparency: the SBOM. This session will outline what an SBOM is and how it helps organisations to manage risk.
  • How to ensure Trust & Security for MCUs without TF-M, TPM or Secure Element chip Oct 13 2021 2:00 pm UTC 45 mins
    Hervé Roche, VP Marketing, Trusted Objects & Rob Dobson, VP Technology, Device Authority
    In this session Trusted Objects and Device Authority will discuss the alternatives for providing Root of Trust (RoT) on devices which don’t have MCUs with TF-M (TrustZone) nor a TPM or Secure Element chip. Alongside this the speakers will be discussing how coupling a software RoT with security automation makes Edge to Cloud possible for large scale IoT, including legacy IoT devices.
  • Challenges in the IoT journey and 5 easy steps to solve them Oct 13 2021 1:00 pm UTC 45 mins
    Patrick Nash, InVMA, Charlie Manners, InVMA and Paul Lockley, Device Authority
    Join this fireside chat with InVMA and Device Authority to learn about the real world challenges facing organisations on their IoT journey today. Find out about real insights and learn about potential solutions to improve your IoT project success and deliver ROI faster.
  • A snapshot into the unique challenges of Smart Cities and how to secure them Oct 12 2021 6:00 pm UTC 45 mins
    Khalil Yazdi, CSO, XIG and Tyler Gannon, VP Strategic Alliances, Device Authority
    Smart cities are no longer a concept or futuristic dream. Thanks to Internet of Things (IoT) solutions, many are already active and expanding rapidly. Municipal governments are leveraging cellular and Low Power Wide Area (LPWAN) wireless technologies to connect and improve infrastructure, efficiency, convenience, and quality of life for residents and visitors alike. But what are the key challenges of Smart Cities? That's what we'll look at during this session, and we'll touch upon a critical factor - security.
  • IoT and Cyber Insurance: why is it important and what are the challenges? Oct 12 2021 5:00 pm UTC 45 mins
    Rob Black, CISSP, Founder and Managing Principal, Fractional CISO
    The explosion of IoT devices is dramatically changing the cyber risk landscape — and not necessarily for the better. Many security experts believe that smart devices are creating a wave of vulnerabilities because they often lack strong — or, in some cases, even basic — security features. IoT devices often also lack regular product support, such as updates and patches, making them particularly vulnerable to newly discovered weaknesses.
  • Kubernetes at the Edge of Manufacturing Oct 12 2021 4:00 pm UTC 45 mins
    Matt Bates, CTO and Co-founder Jetstack, and James Penney, CTO, Device Authority
    Bringing more and more intelligence close to the manufacturing floor brings new levels of agility and product innovation. Kubernetes is the operating system for today’s cloud-native generation, and the right fit to bring powerful compute, analytics, and automation right to the factory floor. Extending capabilities once only reserved for the cloud next to assembly line means that identity is critical. Good news: Building in machine identity for your devices at the Edge closest to your production is simpler, faster, easier than ever before with Kubernetes. Learn how Kubernetes and CNCF Sandbox project cert-manager are bringing machine identity that’s shockingly simple and ready to scale.
  • What is the IoT edge and why is security important? Oct 12 2021 3:00 pm UTC 45 mins
    Steve Busby, Microsoft and James Penney, Device Authority
    The edge of the IoT is where the action is. It includes a wide array of sensors, actuators, and devices—those system end-points that interact with and communicate real-time data from smart products and services. From a security standpoint, data at the edge can be troublesome, especially when it’s being handled by different devices that might not be as secure as centralized or cloud-based systems. As the number of IoT devices grows, it’s imperative that IT understands the potential security issues and makes sure those systems can be secured.
  • An analyst insight into the current IoT IAM market Oct 12 2021 2:00 pm UTC 45 mins
    Divya Baranawal, Research Director, Quadrant Knowledge Solutions
    Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.

    This interactive session will focus on:
    * Key capabilities of IoT IAM platforms to meet the requirements of IoT security
    * Understand why IoT IAM is substantially different from Traditional IAM
    * Current state of the market / vendors
    * Market drivers and expected growth (importance of IoT IAM)
  • Introduction to the IoT Security Summit: Edge to Enterprise Oct 12 2021 1:00 pm UTC 45 mins
    Darron Antill, CEO, Device Authority and Kevin Bocek, VP Security Strategy & Threat Intelligence, Venafi
    The opening session for the virtual IoT Security Summit hosted by Device Authority with special guests throughout the 3 days. We'll provide an introduction to the theme of the event and provide an overview of what can be expected. We'll be joined by special guest, Kevin Bocek, VP Security Strategy & Threat Intelligence at Venafi.
  • Zero Trust– A Scalable Way to Secure IoT Recorded: Feb 24 2021 52 mins
    Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr
    Enough scouring through MAC and IP addresses—tell me what’s really on my network—what’s their role and what are they doing? How do I extend Zero Trust segmentation to secure devices at scale? In this session, you learn simple and efficient solutions to discover and secure every IoT asset on your network. This session will answer common concerns and questions such as:

    Which devices are vulnerable and at risk? Are devices behaving as expected?
    How can I quickly lock down threats and respond to the security notice de jour?
    I am tired of my team playing whack-a-mole. What can I do to prevent attacks?
    How can I leverage my existing network and security infrastructure to segment and protect IoT devices?
  • Managing the Risks of Connected Medicine in the Real Time Health System Recorded: Feb 24 2021 45 mins
    Stephan Goldberg, VP of Systems Engineering, Medigate
    Health systems continue to push forward to capture the benefits of real time interoperability. Remarkably, many do so without detailed knowledge of what’s connected to their networks and/or how to size and implement rational, agile security measures. With IoMT spending growing at a CAGR of 20%, we’re witnessing a revolution in the way care will soon be delivered. This webinar will zero-in on the emerging challenges faced by HIT and HTM professionals. Asset management and cybersecurity convergence will be discussed, along with the latest solution advances and how they are unifying workflows to ensure practice scalability. Use-case demonstrations will be provided in this context.
  • The Role of IoT IAM in IoT Security: A market and analyst perspective Recorded: Feb 24 2021 43 mins
    Divya Baranawal, Research Director, Quadrant Knowledge Solutions and Rao Cherukuri, CSO, Device Authority
    Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.

    This interactive session will focus on:
    * Key capabilities of IoT IAM platforms to meet the requirements of IoT security
    * Understand why IoT IAM is substantially different from Traditional IAM
    * Current state of the market / vendors
    * Market drivers and expected growth (importance of IoT IAM)
  • IoT Security Use Cases Recorded: Feb 24 2021 24 mins
    Peter Morton, McLaren Automotive and Device Authority
    IoT comes alive when we talk about real customer use cases. Firstly we look at the challenges or pain points they have, and provide a solution and explain how to do it. The main verticals we'll explore are Healthcare / Medical Devices, Industrial / Manufacturing, and Automotive.
Trust for every Thing
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler.

IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Introduction to the Enterprise IoT Security Lifecycle
  • Live at: Feb 23 2021 3:00 pm
  • Presented by: Darron Antill, CEO and Rao Cherukuri, CSO, Device Authority
  • From:
Your email has been sent.
or close