Hi [[ session.user.profile.firstName ]]

Livestream Video - Securing the IoT in the Age of Threats

The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

Join this interactive panel with IoT and security experts to learn more about:
- Impact of IoT on enterprise security
- How to assess the IoT risk
- Most common IoT vulnerabilities and how to address them
- Recommendations for improving IoT security

Panellists
Jason Soroko, CTO of IoT, Sectigo
Andrew Hollister, Chief Architect & Product Manager, LogRhythm
Wallace Sann, VP Global Systems Engineering, Forescout Technologies
Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group

Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
Recorded Jun 4 2019 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo
Presentation preview: Livestream Video - Securing the IoT in the Age of Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Automating IT Security at the Dawn of Quantum Computing Recorded: Oct 17 2019 49 mins
    Tim Callan, Senior Fellow & Jason Soroko, CTO of IoT at Sectigo
    Quantum computers are coming, and they will render the digital world’s cryptographic underpinnings insecure. It is not a matter of if but only when.

    Though the exact timing of the Quantum Apocalypse cannot be known, new cryptographic alternatives must be found and deployed as soon as possible. In this context, no one knows what to expect, but there’s at least one certainty, crypto-agility will be a key requirement for organisations willing to safeguard private and public trust when new cryptographic models become available.

    One of the best ways to achieve crypto-agility is through automation, and Sectigo offers plenty of options. Join this webinar to learn how to automate all aspects of digital certificate lifecycles, from discovery to deployment and management.
  • IoT Security in 2019: Risks and Cyber Resilience Recorded: Aug 7 2019 48 mins
    Chris Morales (Vectra) | Jason Soroko (Sectigo) | Todd Weber (Optiv) | Rudolph Araujo (Awake Security)
    As the Internet of Things continues to grow, so do the security and privacy risks and vulnerabilities associated with IoT devices on enterprise networks. Organizations worldwide are looking to assess and manage their risk, implement basic cyber hygiene, and improve their security posture. Discover the best strategies for achieving security at every level, including IoT.
    Join this interactive panel with industry experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Speakers:
    - Chris Morales, Head of Security Analytics, Vectra (Moderator)
    - Jason Soroko, CTO of IoT, Sectigo
    - Todd Weber, Chief Technology Officer, Optiv
    - Rudolph Araujo, VP Marketing, Awake Security
  • Ask the IoT Security Expert: Securing a World of Inter-Connected Devices Recorded: Aug 7 2019 25 mins
    Jason Soroko, CTO of IoT, Sectigo & Diana Kelley, Cybersecurity CTO, Microsoft
    Today's digitally connected businesses require multi-layer defense against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.

    Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.

    Join us, live from Las Vegas as we learn about:
    - How identity plays a role in IoT security
    - The role of trust models to enable third party device interoperability
    - If three is a way to secure a digital identity for devices that do not have a hardware
    secure element such as a TPM
    - The latest IoT device security legislations
    - Determining if IoT connected devices in your operations infrastructure are secure
  • PKI for DevOps Recorded: Jul 18 2019 44 mins
    Tim Callan, Senior Fellow & Jason Soroko, CTO of IoT at Sectigo
    DevOps as a software development and deployment methodology has radically transformed enterprise computing. This approach brings with it new architectures and tools such as containerization, Kubernetes, and multi-cloud.

    In this webinar, you will learn how PKI plays a critical role in DevOps environments and how enterprises can best use certificates to keep their platforms safe.
  • Livestream Video - Securing the IoT in the Age of Threats Recorded: Jun 4 2019 43 mins
    Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo
    The ever-growing Internet of Things continues to pose security and privacy threats. How are businesses managing the risks associated with IoT devices on their networks? What are the best strategies for achieving basic security and cyber hygiene?

    Join this interactive panel with IoT and security experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Panellists
    Jason Soroko, CTO of IoT, Sectigo
    Andrew Hollister, Chief Architect & Product Manager, LogRhythm
    Wallace Sann, VP Global Systems Engineering, Forescout Technologies
    Nigel Stanley, CTO - Global OT & Industrial Cyber Security CoE, TÜV Rheinland Group

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • Ask the IoT Security Expert: How to Protect your Business in the IoT Recorded: Jun 4 2019 16 mins
    Jason Soroko, Sectigo | Yotam Gutman, Cybersecurity Marketing Community
    Today's digitally connected businesses require multi-layer defence against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.

    Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.

    - How to determine if IoT connected devices in your operations infrastructure are secure
    - What is the difference between symmetric tokens, PKI based certificates and device identities?
    - What is the role of trust models to enable third-party device interoperability?
    - What are some methods to provision a device with a x509 certificate?
    - How to secure a digital identity for devices that do not have a hardware secure element such as a TPM?

    Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
  • The Future of PKI in the Modern Enterprise Recorded: May 14 2019 38 mins
    Tim Callan, Senior Fellow & Jason Soroko, CTO of IoT at Sectigo
    When you hear “Private PKI,” you probably immediately think about securing intranet sites and outsourcing Microsoft CA. These are indeed very common use cases.

    But with enterprises facing increasingly complex IT environments, and an ever-growing number of interconnected devices, the need for encryption has become greater than ever before.

    Did you know that Private PKI allows you to secure and manage devices and applications as diverse as:
    • Web servers
    • Mobile devices
    • IoT devices
    • DevOps
    • Cloud/Multi-Cloud applications

    Join our industry experts Tim Callan and Jason Soroko and discover how Sectigo Private CA allows you to secure and automate the management of your internal devices and applications (regardless of which internal protocols you have in place), and save you costs, time and resources in the long run.
PKI and Security webinars for IT professionals
We are the world's largest commercial SSL Certificate Authority. Our webinars are specially designed to help you protect your online business, connected devices, applications, and digital identities.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Livestream Video - Securing the IoT in the Age of Threats
  • Live at: Jun 4 2019 1:00 pm
  • Presented by: Wallace Sann, Forescout | Nigel Stanley, TÜV Rheinland Group | Andrew Hollister, LogRhythm | Jason Soroko, Sectigo
  • From:
Your email has been sent.
or close