Hi [[ session.user.profile.firstName ]]

IoT Security Use Cases

IoT comes alive when we talk about real customer use cases. Firstly we look at the challenges or pain points they have, and provide a solution and explain how to do it. The main verticals we'll explore are Healthcare / Medical Devices, Industrial / Manufacturing, and Automotive.
Recorded Feb 24 2021 24 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Morton, McLaren Automotive and Device Authority
Presentation preview: IoT Security Use Cases

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Zero Trust– A Scalable Way to Secure IoT Recorded: Feb 24 2021 52 mins
    Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr
    Enough scouring through MAC and IP addresses—tell me what’s really on my network—what’s their role and what are they doing? How do I extend Zero Trust segmentation to secure devices at scale? In this session, you learn simple and efficient solutions to discover and secure every IoT asset on your network. This session will answer common concerns and questions such as:

    Which devices are vulnerable and at risk? Are devices behaving as expected?
    How can I quickly lock down threats and respond to the security notice de jour?
    I am tired of my team playing whack-a-mole. What can I do to prevent attacks?
    How can I leverage my existing network and security infrastructure to segment and protect IoT devices?
  • Managing the Risks of Connected Medicine in the Real Time Health System Recorded: Feb 24 2021 45 mins
    Stephan Goldberg, VP of Systems Engineering, Medigate
    Health systems continue to push forward to capture the benefits of real time interoperability. Remarkably, many do so without detailed knowledge of what’s connected to their networks and/or how to size and implement rational, agile security measures. With IoMT spending growing at a CAGR of 20%, we’re witnessing a revolution in the way care will soon be delivered. This webinar will zero-in on the emerging challenges faced by HIT and HTM professionals. Asset management and cybersecurity convergence will be discussed, along with the latest solution advances and how they are unifying workflows to ensure practice scalability. Use-case demonstrations will be provided in this context.
  • The Role of IoT IAM in IoT Security: A market and analyst perspective Recorded: Feb 24 2021 43 mins
    Divya Baranawal, Research Director, Quadrant Knowledge Solutions and Rao Cherukuri, CSO, Device Authority
    Securing IoT devices and solutions requires a purpose-built device-centric IAM solution as traditional employee-centric IAM or customer IAM (CIAM) solutions are not capable of addressing IoT-specific challenges.

    This interactive session will focus on:
    * Key capabilities of IoT IAM platforms to meet the requirements of IoT security
    * Understand why IoT IAM is substantially different from Traditional IAM
    * Current state of the market / vendors
    * Market drivers and expected growth (importance of IoT IAM)
  • IoT Security Use Cases Recorded: Feb 24 2021 24 mins
    Peter Morton, McLaren Automotive and Device Authority
    IoT comes alive when we talk about real customer use cases. Firstly we look at the challenges or pain points they have, and provide a solution and explain how to do it. The main verticals we'll explore are Healthcare / Medical Devices, Industrial / Manufacturing, and Automotive.
  • Integrate IoT security in the Enterprise: Leverage existing security investments Recorded: Feb 24 2021 58 mins
    Juan Asenjo, Entrust and Julio Merette, Device Authority
    The majority of Enterprise IoT security implementations need to take existing IT security controls into account and seamlessly interoperate with IoT devices. The challenge is integrating IoT IAM with the traditional Enterprise IAM, Hardware Security Modules (HSMs), and Data Security Platforms.

    • Enterprises use HSMs for Root of Trust, secure storage of keys, and secure crypto operations. HSMs are used for IoT identity provisioning and data security operations.
    • Enterprises already use data security platforms for key management and policy-based data access authorization. Integration with these systems is essential for end-to-end data security and compliance. This is required for secure data exchange between IoT devices and other Enterprise resources including enterprise users.
    • IoT IAM and Enterprise traditional IAM need to interoperate to authorize and share data between the IoT devices, Enterprise systems, and users.

    Join this session to hear from Device Authority and guest speakers on how to efficiently integrate IoT security in the Enterprise, while also leveraging existing security investments.
  • Managing the IoT device security lifecycle Recorded: Feb 24 2021 46 mins
    Jon Coons, Microsoft, and James Penney, Device Authority
    Learn about the steps required to connect production devices to IoT platforms/applications without human intervention, with a suitable environment for managing IoT devices throughout their security lifecycle.
  • Secure by Design: Identity, Provisioning and Automation is the Key to IoT Recorded: Feb 24 2021 45 mins
    Brian Colgan, EPS Global; Kamal Khan, Intrinsic ID; Rob Dobson, Device Authority
    Join an expert panel as we discuss what secure by design really means for IoT – throughout the supply chain. We’ll look at IoT device security including operational security management, zero touch provisioning, and automated device quarantining.

    Are you building a new connected product, solution or service? How can you ensure trust is built in from the beginning?

    Are you confident that the supply chain and device programming is secure? i.e. provisioning of firmware?
  • Enabling Industry 4.0 and Digital Transformation by bridging IoT Security gaps Recorded: Feb 24 2021 59 mins
    Mark Brown, David Mudd, and Isabel Forkin, BSI
    With the acceleration of Industry 4.0, accompanied by the convergence of the Internet of Things (IoT) and Operational Technology (OT), systems can now be connected to corporate IT, the cloud and central management systems. The number of connected devices is predicted to rise to 75 billion by 2025, and with that expansion comes increased risk. As Organisations embrace digital transformation and evolve the new normal, they need to understand their accountability and responsibility for security in the ecosystem. This is particularly important in sectors like healthcare, where connect devices are used to monitor and treat patients and transmit sensitive data. This highlights the importance of the security and resilience of the devices, applications and the data they generate.

    The session will cover:
    * Explore the issue of IoT security across the asset lifecycle and the risks associated with exposed networks
    * Look at accountability from planning and manufacture, to installation and disposal
    * Explain how to ensure a robust system, manage business and technology cyber risks and achieve sustainable resilience in IoT
  • Automating Device Security at IoT Scale Recorded: Feb 23 2021 46 mins
    Srinivas Akella - Founder and CTO, WootCloud and Rao Cherukuri, CSO, Device Authority
    With the explosion in the number and types of connected devices lacking Security by Design architecture, developing rich device context is of critical importance to ensure network security and access control. There is also a growing regulatory demand to audit all devices on the network, for stronger device hygiene and access restrictions.

    WootCloud’s award-winning ML/AI Hyper-Context Security Platform provides contextualized visibility and analytics for all devices, and uses this intelligence to segment the network, correlate threats and vulnerability propagation across interfaces and automate access control.

    This interactive live session will demonstrate how WootCloud HyperContext® delivers a deep understanding of all devices entering/exiting your network. In addition, you will learn how HyperContext stitches together a comprehensive understanding of the risks and threats, and generates strong access control policies to automate device security at IoT scale.

    Key Takeaways:
    1. How to Detect, Inspect, Defend every device in your organization at IoT scale using device context.
    2. Understand why HyperContext® is more powerful than the current fingerprinting solutions.
    3. Automate access control and supercharge your existing security investments with strong integrations.
    4. Understand why HyperContext® is an essential part of moving towards IoT platforms and Security by Design.
  • Enterprise IoT Security – What you need to know Recorded: Feb 23 2021 46 mins
    Nadir Izrael, Chief Technical Officer, Armis
    IoT devices are everywhere, helping organizations collect real-time data and automate tasks for greater productivity and efficiency. The number of unmanaged devices are exponentially growing with the advent of Industry 4.0 / Digital transformation. This session will cover the exposures and threats associated with these devices.

    If you’re responsible for threat management, or if your team has been discussing how to secure unmanaged assets and IoT devices, you don’t want to miss this session:
    * State of Enterprise IoT Security
    * Security challenges with unmanaged and IoT devices
    * How to respond to these threats
    * How to protect these devices from future attacks or breaches
  • Protecting your IoT software delivery against malware insertion Recorded: Feb 23 2021 28 mins
    Eddie Glenn, Venafi
    In December 2020, it was reported that a software supply chain cyber-attack occurred against SolarWinds which caused infections in numerous businesses and government agencies. While complex in nature, this involved vulnerabilities in the build cycle at SolarWinds.

    For an IoT manufacturer, securing your software supply chain and your build process is as critical as is securely delivering updates to your IoT devices. In this session, we’ll cover:

    • A review of how SUNBURST was introduced into the software supply chain
    • Steps that can be taken by software developers to minimize this from happening to you
    • How digitally signing source code and other intermediate artifacts during your software build process can minimize these risks
    • The benefits of securing a code signing process for your company
  • IoT Security: What legislation, regulations and standards are important? Recorded: Feb 23 2021 48 mins
    David Rogers, IoTSF and Paul de Curnou,Device Authority
    In today's current landscape, when we talk about IoT devices we often hear about legislation, regulations, and standards to follow. There are general IoT security or cybersecurity laws, as well as industry specific regulations - such as HIPAA. These laws and regulations can also differ depending on your geographical location.

    Join this session to decipher the new legislation, current regulations and standards to follow to ensure a safe and secure IoT world - whether you're building IoT products, developing IoT apps or processing vast amounts of data.
  • Building security within IoT devices:Security by design & supply chain integrity Recorded: Feb 23 2021 46 mins
    Marc Canel, Imagination Technologies and Rob Dobson, Device Authority
    IoT devices are typically built for a specific application. The user manages the binding of the device to its cloud application through error prone manual processes. This cumbersome and risky approach prevents large-scale adoption. Single purpose devices adds cost and complexity. It's an industry wide issue driven by the fragmentation of the IoT marketplace and the desire of actors for differentiation. This presentation will cover:
    • The industry's need to find remedies to security and supply chain problems
    • Industry wide collaboration to design protocols for provisioning and on-boarding
    • The importance of removing manual and password driven operations
  • Introduction to the Enterprise IoT Security Lifecycle Recorded: Feb 23 2021 43 mins
    Darron Antill, CEO and Rao Cherukuri, CSO, Device Authority
    The Internet of Things (IoT) presents a massive business opportunity across almost every industry. But to realize that opportunity, enterprise IoT security must become a primary focus. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the legal and safety consequences of compromised security.

    Until now, security has been treated as an afterthought; by adding layers of security after devices are delivered, with infrastructure and applications already in place. But security for IoT is too important to be treated as an afterthought. IoT’s unique characteristics are also forcing a fundamental rethink about how Enterprises need to implement security management for devices and data.

    The Enterprise IoT Security Blueprint was first introduced by Device Authority in April 2018 and has since evolved to incorporate further steps within the emerging Enterprise IoT state. This evolution is a result of technology innovation and exploring real world use cases in different industries which require robust security by design.
  • Secure by Design: IoT Security Lifecycle Management with Microsoft Azure Sphere Recorded: Nov 4 2020 46 mins
    Josh Nash, Microsoft and James Penney, Device Authority
    Microsoft has developed a plethora of features and flexible interfaces for building IoT solutions with their Azure IoT platform. The rich set of components in Azure enable customers to adopt the right integration and policies as per their application requirements.

    One of Microsoft’s latest additions, Azure Sphere, addresses an important Secure by Design foundation in IoT for devices, taking a step forward to help monitor security, and also provides a secure software update mechanism for these devices. This approach is solving a foundational challenge that we articulate in step 1 of our Enterprise IoT security model; secure production – where root keys are provisioned.

    In this webinar you will learn about:
     The 7 properties of highly secure devices
     The importance of network security
     Steps to connect production devices to IoT platforms/applications without human intervention
     The environment for managing IoT devices through their security lifecycle

    The webinar will include a short demonstration of Microsoft Azure Sphere and Device Authority KeyScaler.

    Sign up today and watch live or on demand.

    Who should attend?
    This webinar is ideal for anyone starting or currently on their IoT journey, looking for guidance or advice on IoT security solutions that scale for hundreds, thousands or even millions of devices.

    The level of content will be suitable for CXOs, VP, Head of, Product Managers, Security Managers, Solutions Architects, and Security Engineers.
  • How to protect IoT devices during manufacturing stage with secure provisioning Recorded: Oct 14 2020 35 mins
    Brian Colgan, EPS Global and Paul Lockley, Device Authority
    The Internet of Things (IoT) is transforming our homes, cars, hospitals, businesses and public spaces – mostly for the better – but without suitable precautions (security, privacy) IoT devices can be an attractive target for malicious actors and cyberattacks.

    When embarking on an IoT project, or designing a new connected device or product, it’s important to factor in security early on. The potential impact of an IoT security breach is forcing a suitable security model from the design and manufacturing phase which supports secure production; the secure provisioning of root keys and certificates at the time of manufacturing, secure mastering, and a foundation for secure updates.

    Join our webinar to learn more about:
    • The challenges and risks of IoT
    • The need for a Secure by Design approach
    • Guideline and solutions to mitigate the risks
    • Real world examples

    We are delighted to be joined by EPS Global. There will be an opportunity to ask the speakers questions during the live session. If you’re watching on demand and have a question, please email info@deviceauthority.com
  • Internet of Medical Things: What is it and how do you secure it? Recorded: Sep 30 2020 31 mins
    Paul de Curnou and Julio Merette, Device Authority
    The Internet of Medical Things is a blend of medical devices and applications that can improve healthcare outcomes. Discover how and why healthcare leaders are prioritizing the biggest IoMT business opportunities. Learn how medical IoT is transforming the healthcare industry and how to protect your organization against cyber attacks.

    Join our webinar to learn more about:
    • What is the Internet of Medical Things or Healthcare IoT?
    • What are the challenges and risks?
    • Real world examples

    There will be an opportunity to ask the speakers questions during the live session. If you’re watching on demand and have a question, please email info@deviceauthority.com
  • IoT Security Made Easy: How to implement secure code signing and update delivery Recorded: Jul 15 2020 29 mins
    Eddie Glenn, Venafi and Nirmal Misra, Device Authority
    As the number of IoT devices & apps continues to grow, so does the need for secure code signing & update delivery.

    Connected devices are only as valuable as the operating systems and applications that they execute. The firmware, operating system and application update processes are highly sensitive and can be a prime target for attack. Hackers have used these methods and systems to spread malware that is completely ‘trusted’ and can avoid Next-Generation Antivirus (NGAV).

    Until recently, there have been limited solutions available that can deliver a full secure end-to-end code signing and update delivery process for IoT use cases, forcing organizations to design and build their own home-grown solutions to fulfil their requirements.

    Join this webinar to:
    • Learn why code signing is important, in particular for IoT
    • Understand how CodeSign Protect helps organisations today
    • Explore a demo of a practical implementation of code-signing and secure update delivery for IoT
  • Meeting Demand for Telemedicine with Secure IoT Solutions Recorded: Jun 3 2020 47 mins
    James Penney and Julio Merette, Device Authority and Juan Asenjo, nCipher Security
    Learn how healthcare providers & hospitals can leverage IoT technology to deliver safe routine care.

    As front-line healthcare workers address the novel coronavirus pandemic, optimization of healthcare resources has become critical. In parallel, healthcare professionals delivering routine care must continue to treat their patients with existing conditions. The current situation is testing telemedicine’s ability to deliver safe and secure routine medical care.

    Telemedicine, along with remote monitoring and diagnostic capabilities, enable the delivery of routine care, particularly during times when face-to-face appointments are not always possible or deemed essential. Being able deliver these services safely and securely is critical.

    This webinar will explore how healthcare service providers and hospitals can leverage telemedicine and IoT technology to help tackle resource constraints and continue to deliver safe routine care.

    Telemedicine and the deployment of connected/IoT medical devices enables doctors to continue to deliver care remotely. Ensuring the safety and security of this delivery method relies on the privacy and integrity of data collected from patients.

    Before the pandemic, Forbes had predicted that approximately 161 million connected medical devices were going to be deployed in hospitals, clinics, and medical offices by 2020. However, along with the growing digitization of medical records and services comes rising cybersecurity threats. Not only is privacy a concern, but integrity is paramount in order to ensure patient safety and trust.

    Join this webcast to learn how:
    • Technology can help healthcare practitioners deliver routine care at a time when people can’t or don’t want to visit a doctors’ office
    • Telemedicine platform/service providers can enhance security with trusted device authentication and data protection
    • Secure IoT can deliver more comprehensive and safe telemedicine services
  • Ensuring operational resilience of Healthcare through effective IoT Security Recorded: May 20 2020 55 mins
    Mark Brown, Wipro; Justin Dyer, Microsoft; Rao Cherukuri, Device Authority
    Join Microsoft, Wipro & Device Authority to learn about IoT security for hospitals & medical devices, security best practices to mitigate the risks/threats, and real-world customer use case for how to protect your devices.

    In recent years, technological innovation has delivered another wave of digital transformation to the healthcare industry. With advances in cloud computing and IoT, more connected devices are being used to monitor patients, make diagnoses and even administer treatments. Some of these devices are located in hospitals, in patients’ homes, or on the patients themselves as wearables, and in-home healthcare will increase as a result. Along with the added convenience and lower cost of medical care provided by smart connected medical devices come increased security threats.

    With the current COVID-19 pandemic, there has been an increase in the number of medical devices required in hospitals to monitor and treat patients. Many of these devices are smart/connected to the internet and transmit sensitive data. This raises the importance of the safety and security of the devices, applications and data they generate.

    Join this virtual event to hear from Microsoft, Wipro and Device Authority, and learn about:
    • Current IoT security threats within hospitals and medical devices
    • Security best practices to mitigate the risks/threats
    • A real-world customer use case for how to protect your devices
Trust for every Thing
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler.

IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IoT Security Use Cases
  • Live at: Feb 24 2021 5:00 pm
  • Presented by: Peter Morton, McLaren Automotive and Device Authority
  • From:
Your email has been sent.
or close