Hi [[ session.user.profile.firstName ]]

Shrinking The IoT Attack Surface - Governance Priorities

IoT devices are a fast growing attack surface within most organizations. A critical part of managing their cyber risk is having an effective governance policy that is supported by actionable controls that can be audited and extensible to devices/applications on IT networks managed by Operational Technology teams. This panel brings together expertise from a corporate enterprise, industry organization, and research firm to dig into what makes for effective governance that reduces the likelihood of cyber criminals being successful in their next attack.
Recorded Jul 28 2021 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Terry Gold (D6 Research), Vikram Phatak (CyberRatings.org), and Philip Jang (VMware)
Presentation preview: Shrinking The IoT Attack Surface - Governance Priorities

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Preventing IoT Man in the Middle Cyber Attacks Recorded: Aug 27 2021 31 mins
    John Gallagher, Vice President, Viakoo
    Man in the middle attacks have been around for a while, but are expanding rapidly with unmanaged and IoT devices. This webinar highlights methods to stop such attacks, especially with using certificates deployed on IoT devices.
  • Shrinking The IoT Attack Surface - Governance Priorities Recorded: Jul 28 2021 61 mins
    Terry Gold (D6 Research), Vikram Phatak (CyberRatings.org), and Philip Jang (VMware)
    IoT devices are a fast growing attack surface within most organizations. A critical part of managing their cyber risk is having an effective governance policy that is supported by actionable controls that can be audited and extensible to devices/applications on IT networks managed by Operational Technology teams. This panel brings together expertise from a corporate enterprise, industry organization, and research firm to dig into what makes for effective governance that reduces the likelihood of cyber criminals being successful in their next attack.
  • Patch Me If You Can - IoT Firmware Management Recorded: Jun 16 2021 38 mins
    John Gallagher, Vice President, Viakoo
    IoT devices are vulnerable to cyber attack almost as soon as you connect them because of known vulnerabilities. Yet many OT and IT teams struggle to stay on top of firmware patches, leaving them open to attack. This webinar highlights why patching IoT devices is significantly different than IT systems, and how automated solutions can help you keep up.
  • Cyber Hygiene of Unmanaged & IoT Devices Recorded: May 20 2021 38 mins
    David Nelson-Gal (Chief Product Officer), John Gallagher (VP of Marketing)
    Overview of Viakoo's automated cyber hygiene and service assurance capabilities, including firmware updating, certificate management, and password policy compliance.
  • Find & Fix Unmanaged & IoT Device Security Gaps & Gotchas Recorded: Mar 24 2021 56 mins
    David Nelson-Gal, Chief Product Office & John Gallagher, VP, Marketing at Viakoo + Vincent Vermeulen, Principal SA at Armis
    Even the largest organizations still have difficulty finding every asset in their environments. And while a complete asset inventory provides the foundation for an effective security strategy, identifying and remediating the risks these devices pose is the best way to understand and reduce your attack surface.

    Armis® and Viakoo® help resolve these problems and more. Armis sees almost five times more assets than traditional IT and security products, and it identifies security gaps and device vulnerabilities, detects anomalous behavior, and automates policy enforcement. Viakoo uses this information to remediate risks on devices automatically by managing firmware, certificates, and passwords, and ensuring they are working as expected.

    Join us to learn more about our joint solution’s benefits for facilities, IT, and security teams, including:
    +Making sure every asset is 100% visible, operational, and secured
    +Improving compliance by making it easier to prove/pass corporate or regulatory audits
    +Reducing time and resources needed to identify and secure unmanaged and IoT devices
    +Deploying devices securely in a way that doesn’t compromise their business value
Viakoo Makes Things Work Securely
Unmanaged and IoT devices are the fastest growing attack surface impacting all types of organizations. Viakoo remediates cyber vulnerabilities by automating firmware updates, certificate management, and password policy enforcement.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Shrinking The IoT Attack Surface - Governance Priorities
  • Live at: Jul 28 2021 5:00 pm
  • Presented by: Terry Gold (D6 Research), Vikram Phatak (CyberRatings.org), and Philip Jang (VMware)
  • From:
Your email has been sent.
or close