Ask the IoT Security Expert: How to Protect your Business in the IoT
Today's digitally connected businesses require multi-layer defence against rising and more sophisticated web-based threats across websites, devices, infrastructure, and cloud.
Join this interactive 1-2-1 discussion where IoT security expert, Jason Soroko, will share how to deal with IoT security challenges.
- How to determine if IoT connected devices in your operations infrastructure are secure
- What is the difference between symmetric tokens, PKI based certificates and device identities?
- What is the role of trust models to enable third-party device interoperability?
- What are some methods to provision a device with a x509 certificate?
- How to secure a digital identity for devices that do not have a hardware secure element such as a TPM?
Moderated by Yotam Gutman, Founder & Community Manager, Cybersecurity Marketing Community
RecordedJun 4 201916 mins
Your place is confirmed, we'll send you email reminders
Tim Callan, Chief Compliance Officer at Sectigo & Jason Soroko, CTO of PKI at Sectigo
The more automated your approach to Digital Identity across the enterprise, the better off you are. Think about the risk of an outage if a certificate expires or if certificates are unknowingly deployed in your environment. How quickly can you swap out all of your certificates due to an unplanned or strategic event? Those are just a few examples, but you get the point! We cannot underestimate the impact of not using automation in identity management, especially as certificate lifespans are now becoming shorter and shorter, and quantum computing is looming on the horizon
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Random number generation is an essential part of successful cryptography. Quantum computers offer to improve this niche technology industry. Join our hosts to learn what quantum random number generators (qRNGs) are, how they stand to improve cryptography and other computing functions, and how they tie into post-quantum cryptography (or don't).
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
California Senate Bill 327 (SB-327) goes into effect January 1, 2020. This groundbreaking ordinance requires basic security measures for devices deployed in California. Join us to learn what SB-327 requires from device manufacturers, which threats it protects against, and how this ordinance is leading the way toward stronger IoT security practices.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
In our industry interactions we frequently run into questions about how PKI and blockchain compare with each other. How do they work similarly or differently? Are they surrogates for each other? Are they complimentary? Join us this episode as we explain the details of how blockchain and PKI work, similarities and differences between them, and what use cases are appropriate for each.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
A recent FBI warning cautions of attacks that circumvent Multi-Factor Authentication (MFA). Join us as we describe contemporary attacks against MFA and how to defend against them.
Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Alan Grau, VP of IoT and Embedded Security at Sectigo.
Expert consensus states that we will need to update cryptography before quantum computers break our existing algorithms in the next ten or fifteen years. But what do we do about IoT devices, which may lack updating mechanisms and live in the field for decades with little available access. Our hosts are joined by repeat guest Alan Grau as we explore how IoT has specific requirements and challenges for quantum resistant crypto.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
SSL certificate practices are governed by the rules of the CA/Browser Forum. But what is the CA/Browser Forum, who is in it, and where do they get their authority? If you've ever wondered about questions like these join our hosts as they describe the origins of the CA/Browser Forum and how it operates.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
The automobile is undoubtedly among today's most complex, commonplace, and security-sensitive IoT devices. Our hosts describe the cyber threats facing connected cars, including real attacks that already have been proven, new challenges that will come with increasingly advanced capabilities, and what manufacturers can do to protect drivers from harm.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
In episode 35 our hosts explained Mosca's Inequality, a formula for calculating when we need to have post-quantum encryption in place to prevent the Quantum Apocalypse. In this episode our hosts embark on a nuanced exploration of the factors influencing this calculation and test whether popular estimates are credible.
Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Alan Grau, VP of IoT and Embedded Security at Sectigo.
We talk about botnets a lot, but not everyone understands how they are built and used by the criminals who control them or how headless IoT devices have greatly added to their power. Expert guest Alan Grau (VP of IoT and Embedded Security, Sectigo) joins us to help dissect today's botnets.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Our hosts frequently run into the assumption that blockchain and PKI are extremely similar technologies and are possibly even competitive to each other. While the two approaches accomplish some related goals, they are very different in how they work and ultimately accomplish different ends. Join us as we explain what blockchain actually does and how it compares to PKI, including some examples of use cases that are appropriate for each of these technologies.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Quantum annealing is a special case of quantum computing for which the engineering challenges are lessened - and therefore we expect computers of this sort to achieve stability sooner. In this episode we examine the potential for the quantum annealing approach to break RSA-based cryptography sooner than most people have been expecting, and the difficulty of predicting the "Z date" at all.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Finding the new quantum-resistant cryptography we will need to replace RSA and ECC is a difficult task requiring the coordinated effort of academics, industry, and government. NIST has stepped in to lead this volunteer community. Join us to learn about this project to discover and vet going-forward crypto candidates, where we stand in the process, and where we go from here.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Quantum computers have the potential to defeat the RSA and ECC encryption underlying our digital world. We must swap out these algorithms before quantum computers reach that stage of maturity. But how long to we have? Join our hosts Tim Callan and Jason Soroko as they explain how to calculate the ominously named "Z date," the possible consequences of missing that deadline, and potential hairstyles for a post-apocalyptic world.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Shadow IT has become a fact of the modern enterprise. SaaS, BYOD, outsourced development, embedded IT, DevOps, and public cloud have all chipped away at the CIO's ability to oversee and control the enterprise's technology systems. This fragmentation leads to identity and access challenges that can affect security, governance, auditability, and compliance. Join our hosts as they discuss these challenges and what IT departments can do to address them.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
Few people know that caller ID numbers have no identity value as they are completely self-reported. This fact enables the plague of robocalling scams sweeping our society right now. Join our hosts as they discuss public telephony systems and other environments that suffer from this problem, where this situation creates vulnerabilities, and what can be done about it.
Tim Callan, CCO at Sectigo, Jason Soroko, CTO of PKI at Sectigo, & Abul Salek, Director of Product Management at Sectigo
ACME is a new SSL certificate automation standard that is taking the world by storm. With support by 150 million web sites and more than 130 open source tools, ACME is a key tool in your digital certificate bag. Join our hosts and guest Abul Salek as they discuss this ACME, why it's important, and what's next for this hugely popular standard.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
The White House is the latest government entity seeking to defeat widespread encryption technology through legislated "back door" access. Join our hosts as they explain why such an idea is essentially unworkable and would endanger the confidential online business and personal services upon which we all depend.
Tim Callan, Senior Fellow at Sectigo & Jason Soroko, CTO of PKI at Sectigo
One cornerstone of successful cryptography is entropy, or the ability to create genuinely unpredictable values. But it turns out that generating truly random numbers is harder than you might think. Join our hosts as they discuss the need for randomness, the lengths companies go to to generate random numbers, and the bad things that can happen when they fail.
We are the world's largest commercial SSL Certificate Authority. Our webinars are specially designed to help you protect your online business, connected devices, applications, and digital identities.
Ask the IoT Security Expert: How to Protect your Business in the IoTJason Soroko, Sectigo | Yotam Gutman, Cybersecurity Marketing Community[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]15 mins