Hi [[ session.user.profile.firstName ]]

Ask the IoT Security Expert: How to Protect your Business in the IoT

Today's digitally connected businesses require multi-layer defence against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.

Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.

- How to determine if IoT connected devices in your operations infrastructure are secure
- What is the difference between symmetric tokens, PKI based certificates and device identities?
- What is the role of trust models to enable third-party device interoperability?
- What are some methods to provision a device with a x509 certificate?
- How to secure a digital identity for devices that do not have a hardware secure element such as a TPM?

Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
Recorded Jun 4 2019 16 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Soroko, Sectigo | Yotam Gutman, Cybersecurity Marketing Community
Presentation preview: Ask the IoT Security Expert: How to Protect your Business in the IoT

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ask the AppSec Expert: How to Secure the Applications you Build, Buy & Manage Recorded: Jun 6 2019 13 mins
    Paul Farrington, Veracode | Yotam Gutman, Cybersecurity Marketing Community
    Tomorrow's businesses need a simpler and more scalable way to increase the resiliency of global application infrastructure, without slowing innovation, today.

    Join this interactive 1-2-1 discussion where EMEA Chief Technology Officer, Paul Farrington (CISSP, MBCS) will share how leading businesses are;

    - Improving the level of security awareness and addressing the skills deficit
    - Enabling developers to fix flaws and prevent new ones
    - Prioritising and triaging the most exploitable flaws
    - Automating application security
    - Providing software development leaders with really useful security metrics
    - Incentivising secure development as part of their culture

    This session will show you how architects and developers are making smarter choices in designing secure software. You will also learn how to report success, and investment justification, to the board whilst setting realistic expectations throughout the software development lifecycle and not just at the destination.
  • Livestream Video - Proactive Data Privacy and Security Recorded: Jun 6 2019 45 mins
    Steve Wright, Bank of England | Bill Mew, The Crisis Team | Ilias Chantzos, Symantec | Allan Boardman, ISACA
    How can enterprises shift from a reactive approach to privacy and data security to being proactive and closer to privacy-and-security-by-design? Join this panel of experts to get the answer to all of your privacy, security and compliance questions.

    Viewers can learn more about:
    - Effect of GDPR: One year later
    - How are enterprises instituting changes to achieve and maintain compliance
    - Challenges to achieving compliance in an IoT world
    - How to bake privacy and security into your processes
    - Best practices for data protection and privacy from the ground up

    Panellists
    Bill Mew, CEO,The Crisis Team
    Steve Wright, CISO & GDPR Advisor, Bank of England
    Ilias Chantzos, Senior Director, Government Affairs, Symantec

    Moderated by Allan Boardman, CGEIT Certification Committee Member, ISACA
  • Livestream Video - Application Security in a DevOps World Recorded: Jun 6 2019 37 mins
    Keith Batterham, DevSecOps Evangelist | Moshe Lerner, Checkmarx | Paul Farrington, Veracode | Yotam Gutman
    With today's enterprises leveraging around 1000 applications and multiple clouds, application security is becoming a key area of focus. Application security testing is being integrated into the DevOps process early on, while automation, speed and coverage and becoming critical to the success of DevSecOps programs.

    Join this interactive panel of industry experts to learn more about:
    - Why application security is critical
    - Key principles for building application security into DevOps
    - Best practices for leveraging automation
    - Speed vs Security: Where do you draw the line?
    - Recommendations for improving security in 2019

    Panellists
    Paul Farrington, EMEA CTO, Veracode
    Keith Batterham, CTO - CISO - DevSecOps Evangelist
    Moshe Lerner, SVP Product Strategy & Corporate Development, Checkmarx

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the DevSecOps Expert: Software Security in DevOps & CI Environments Recorded: Jun 6 2019 14 mins
    Moshe Lerner, Checkmarx | Yotam Gutman, Cybersecurity Marketing Community
    The increased complexity of software and the need to keep up with fast-paced release cycles create new types of risk in the form of Software Exposure.

    Join this interactive 1-2-1 discussion where product strategist and industry expert, Moshe Lerner will share insights including;

    - Why you should consider software security as non-functional issue?
    - What are the key challenges for managing software security in general and in DevOps environments?
    - Best of breed vs Best of suite – Which is the right approach?
    - The difference between interactive application security testing (IAST) and dynamic application security testing (DAST)? Can IAST replace DAST?
    - How to manage and reduce application security risk at scale

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Data Management Expert: Security and Compliance in the Cloud Recorded: Jun 6 2019 10 mins
    Nicolas Groh, Field CTO EMEA, Rubrik
    Join this interactive 1-2-1 discussion where Field Chief Technology Officer, Nicolas Groh will share;

    - Challenges businesses are facing today with regards to security and compliance in the cloud
    - Improvements that can be made today to ransomware prevention, detection, and recovery
    - Long-term security and compliance strategies
    - Quantifiable outcomes businesses can expect to see with a unified system of records

    Moderated by Paige Bidgood, EMEA Community Lead - IT Security & GRC, BrightTALK
  • Ask the Data Security Expert: How to Protect your Business in the Cloud Recorded: Jun 5 2019 16 mins
    Carl Leonard, Forcepoint | Raef Meeuwisse, ISACA Expert Speaker
    Cloud security is a key challenge for today's data-driven businesses.

    Join this interactive 1-2-1 discussion where Principal Security Analyst, Carl Leonard will share insights on;

    - What are the top cyber threats and trends to look out for in 2019?
    - Why are businesses continuing to suffer data breaches?
    - How are businesses securing themselves as they embrace digital transformation?
    - What is secure SD-WAN? Why is it increasingly important to businesses with distributed office locations?
    - What are the most important security solutions for businesses wishing to safely adopt cloud services?

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Livestream Video - Protecting Against Phishing, Ransomware & Social Engineering Recorded: Jun 5 2019 47 mins
    Raef Meeuwisse| Carl Leonard, Forcepoint | John Scott, Bank of England | Adenike Cosgrove, Proofpoint | Richard Agnew, Code42
    External and internal threats continue to pose a challenge for security professionals worldwide. How are businesses preparing against attacks like phishing, ransomware, and social engineering?

    Join security experts from the industry to learn more about:
    - The most prevailing cyber threats businesses face in 2019
    - Lessons from cyber attacks and strategies for protecting against them
    - Solutions for faster breach detection and response
    - Why network visibility is key
    - Recommendations for improving enterprise security

    Panellists
    Richard Agnew, VP EMEA, Code42
    Carl Leonard, Principal Security Analyst, Forcepoint
    John Scott, Head of Security Education, Bank of England
    Adenike Cosgrove, Cybersecurity Strategist, Proofpoint

    Moderated by Raef Meeuwisse, ISACA Expert Speaker and co-author of "How to Hack a Human: Cybersecurity for the Mind"
  • Livestream Video - CISO Challenges and How to Solve Them Recorded: Jun 5 2019 43 mins
    Darren Thomson, Symantec | David Boda, Camelot Group | George Patsis, Obrela Security Industries | Martin Mackay, Proofpoint
    Today's CISO faces a myriad of challenges when it comes to securing the enterprise. From budgetary concerns and vendor confusion to dealing with the chronic lack of cyber talent, to addressing the disappearing security perimeter, CISOs are looking for ways to automate security operations and leverage AI to do more with existing teams and fewer tools.

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - Coping with analyst fatigue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    David Boda, CISO, Camelot Group
    Darren Thomson, CTO - EMEA, Symantec
    George Patsis, CEO, Obrela Security Industries
    Martin Mackay, Senior Vice President - EMEA, Proofpoint

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Cyber Expert: How to Manage Cyber Exposure, Risks and Compliance Recorded: Jun 5 2019 13 mins
    George Patsis, Obrela Security Industries | Yotam Gutman, Cybersecurity Marketing Community
    Join this interactive 1-2-1 discussion where information security expert, George Patsis will share how to;

    - Align cybersecurity function with organisational and business strategy
    - Meet regulatory and compliance requirements
    - Deal with breaches in an ever-changing technology landscape
    - Create valuable reports

    During this session, you will learn how to identify, predict and prevent cyber threats, in real time.

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Live Interview: Importance of Building a People Centric Cybersecurity Strategy Recorded: Jun 5 2019 16 mins
    Martin Mackay, Senior Vice President, EMEA
    More than 99% of all targeted cyberattacks rely on users to activate them. It is evident that people need to be at the centre when building a robust cybersecurity strategy in the era of highly sophisticated attacks.

    Join our EVP, EMEA, Martin MacKay at this live interview as he discusses key findings from the threat landscape and gives some practical tips on how CISOs can build a truly people-centric security strategy.

    We'll discuss:
    - Today's most notorious cyber threats and trends.
    - How the attackers are changing tactics to target specific people in your organisation and how to protect against these threats.
    - CISO's role in changing company culture towards security risks and awareness and some tips on changing user behaviour to reduce risk.
  • Ask the Cloud Security Expert: How to Protect your Critical Data in the Cloud Recorded: Jun 4 2019 19 mins
    Dave Barnett, Forcepoint EMEA | Alex Hilton, Cloud Industry Forum
    Effectively protecting critical data in the cloud is a key challenge for today's data-driven businesses.

    Join this interactive 1-2-1 discussion where Cloud Access Security Broker (CASB), Dave Barnett will share insights on;

    - Why and how today organisations are protecting data in the cloud.
    - What are the main risks inherent in the adoption of cloud services?
    - Where the key challenges are in protecting data in the Cloud?
    - What to look for when selecting cloud security for your organisation

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
  • Ask the Data Protection Expert: How to Protect your Data Journey Recorded: Jun 4 2019 15 mins
    Patrick Grillo, Fortinet | Yotam Gutman, Cybersecurity Marketing Community
    Join this interactive 1-2-1 discussion where network security and IP networking solutions expert, Patrick Grillo will share how to deal with security challenges as networks evolve including cloud-based resources and SD-WAN.

    Key themes to be explored include;

    - Why security should never be treated as an afterthought
    - The impact of new technologies/techniques on existing security infrastructure/practice
    - How to develop/maintain a consistent security practice beyond technology
    - How to get C-suite commitment and build the right organizational structure

    This session showcases the need for security continuity by connecting a number of disparate concepts, for example how the Cloud services and SD-WAN are related.

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Livestream Video - Securing the IoT in the Age of Threats Recorded: Jun 4 2019 43 mins
    Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo
    The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

    Join this interactive panel with IoT and security experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Panellists
    Jason Soroko, CTO of IoT, Sectigo
    Andrew Hollister, Chief Architect & Product Manager, LogRhythm
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Livestream Video - Multi-Cloud Security and Compliance Recorded: Jun 4 2019 46 mins
    John Meakin, GSK | Patrick Grillo, Fortinet | Dave Barnett, Forcepoint EMEA | James Hughes, Rubrik
    The cloud strategy of today's enterprise spans across multiple clouds and hundreds of applications. Point security solutions no longer work, so enterprises are turning toward a more orchestrated approach to achieving security and compliance in the cloud.

    Join cloud and security leaders in an interactive discussion to learn about:
    - Key security and compliance challenges associated with a multi-cloud strategy
    - Recommendations for managing and automating security across multiple clouds and applications
    - The future of cloud
    - Improving enterprise security in an ever-changing threat landscape

    Panellists
    James Hughes, Field CTO, Rubrik
    Dave Barnett, Head of CASB, Forcepoint EMEA
    Patrick Grillo, Senior Director - Security Solutions, Fortinet
    John Meakin, Group Chief Information Security Officer, GlaxoSmithKline (GSK)

    Moderated by Alex Hilton, Chief Executive, Cloud Industry Forum
  • Ask the IoT Security Expert: How to Protect your Business in the IoT Recorded: Jun 4 2019 16 mins
    Jason Soroko, Sectigo | Yotam Gutman, Cybersecurity Marketing Community
    Today's digitally connected businesses require multi-layer defence against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.

    Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.

    - How to determine if IoT connected devices in your operations infrastructure are secure
    - What is the difference between symmetric tokens, PKI based certificates and device identities?
    - What is the role of trust models to enable third-party device interoperability?
    - What are some methods to provision a device with a x509 certificate?
    - How to secure a digital identity for devices that do not have a hardware secure element such as a TPM?

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the Cyber Risk Expert: How to Minimise Cybersecurity Risk Factor in M&A Recorded: Jun 4 2019 8 mins
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Any merger or acquisition poses daunting challenges to IT leaders. Not only are they tasked with integrating people, processes and technology in the shortest possible time frame, they must also remain vigilant about addressing the added cybersecurity risks.

    Join this interactive 1-2-1 discussion where systems engineering expert, Wallace Sann will share how to minimise the cybersecurity risk factor in M&A including;


    Who are the key decision makers in the M&A process and what are the different/new challenges they’re facing?
    What has historically been the risk focus for acquiring companies, and how is that focus changing?
    How can companies as a whole minimize cyber risk and protect themselves during the M&A process?
    Are there any opportunities for IT teams to reduce cyber risk during an M&A?
    What does Forescout recommend companies do in order to enhance their cybersecurity posture when preparing for an acquisition?
    With the explosion of IoT devices across industries, should there be more concern around connected devices during an acquisition?
Infosecurity Europe 2019
With over 19,000 attendees, Infosecurity Europe is the biggest security conference in Europe. Tune into our interviews with IT and Cyber Security professionals discussing the challenges facing organisations in the current threatscape.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ask the IoT Security Expert: How to Protect your Business in the IoT
  • Live at: Jun 4 2019 9:30 am
  • Presented by: Jason Soroko, Sectigo | Yotam Gutman, Cybersecurity Marketing Community
  • From:
Your email has been sent.
or close