How to Build End-to-End IoT Device Security at Scale

Logo
Presented by

Ted Shorter (CTO), Ellen Boehm (VP, IoT Strategy), Kim Bybjerg (VP at Tata Communications), Paul Hampton (Sr. Product Mgr.)

About this talk

Connected things include a variety of IoT endpoint devices across several critical infrastructure segments, including utilities, automotive, healthcare, retail, and building automation. Complex manufacturing supply chains make it difficult to build electronic devices that can be trusted – forcing security to be bolted on as a feature rather than being a critical element designed at the start of a product’s lifecycle. By adopting a Zero Trust approach, IoT manufacturers can ensure device trustworthiness and security at scale through their product's end-to-end lifecycle. In this panel with device security experts, discussion topics will include: -How businesses can gain a competitive advantage by embedding security in the devices they manufacture -Regulations relating to IoT security that manufacturers should be aware of -Where secure crypto fits into the product design and lifecycle process -Common IoT device security challenges that require a zero trust manufacturing approach Device security experts in this panel include: -Ted Shorter, Co-Founder & CTO at Keyfactor -Ellen Boehm, VP of IoT Strategy and Operations at Keyfactor -Kim Bybjerg, VP/Head of Continental Europe at Tata Communications & Chairman of IMC (IoT M2M Coucil) -Paul Hampton, Senior Product Manager, Thales
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (576)
Subscribers (73773)
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day. We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.