InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Authority On... Strategic Security in a Connected World: A Conversation with Grace Cassy

Presented by

Louise Salih, Senior Marketing Manager | Grace Cassey, Co-Founder of CyLon Ventures

About this talk

In this episode of The Authority On…, we’re joined by Grace Cassy — co-founder of CyLon Ventures, board member at Ten Eleven Ventures, and external expert on the UK’s 2025 Strategic Defence Review. Grace brings a unique perspective at the intersection of cybersecurity investment, policy, and national resilience. Together, we explore how the Strategic Defence Review signals a shift in how the UK approaches security in a hyper-connected world — from protecting Critical National Infrastructure (CNI) to enabling public-private innovation in defence and beyond. We discuss the growing convergence of cyber and physical threats, the role of startups in securing national capabilities, and what it takes to build trust in a digital-first world. With input from the Device Authority team, this episode bridges strategy with on-the-ground security challenges faced by organisations today.
Device Authority - IoT Security

Device Authority - IoT Security

6401 subscribers106 talks
Discovery, visibility and automated security
Device Authority enables end to end cyber resilience for connected devices through the discovery, visibility and automated security of large IoT/OT deployments. With device identities outnumbering human identities 82:1 in enterprise environments and as unmanaged devices become a major target for attack, Device Authority’s Discovery Tool and KeyScaler-as-a-Service (KSaaS) platform provide organizations with complete visibility and control of their device identities and vulnerabilities, reducing human error, accelerating incident response, minimizing risk, ensuring complete device and data trust, and enabling trusted AI in any connected environment.​
Related topics