Hi [[ session.user.profile.firstName ]]

IoT Security Best Practices: Migrating Away from Open Source Security

Part 2 – Understanding Compliance and Support Costs

Open source security software has made it easy for developers to get started with securing IoT devices. In this webinar (Part 2 in a 3-part series), you’ll hear from industry experts on the hidden compliance challenges and support costs of using open source security.
Recorded Mar 28 2018 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana
Presentation preview: IoT Security Best Practices: Migrating Away from Open Source Security
  • Channel
  • Channel profile
  • Automated Security Lifecycle Management – Mocana TrustCenter Recorded: Oct 10 2018 46 mins
    Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana
    Part 3 Automated Certificate Management

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • Industrial Cybersecurity: Zero Touch Provisioning Recorded: Sep 26 2018 98 mins
    Sid Snitkin, ARC Advisory Group, Guy AlLee, Intel, Dean Weber, Mocana Corporation, and Lucian Fogoros, IIoT World
    IoT Industrial Cloud systems are rapidly maturing as packaged systems that can sense, collect, analyze, and action on edge devices. However, the software-based device security and manual/proprietary provisioning methods delivered by platform providers are preventing deployments from scaling.

    In this webinar, we decompose the industrial data pipeline and demonstrate where device management security services instrumented for hardware security can be applied to build a connected security model that attests, provisions, updates, and manages devices. Automated secure device provisioning without human intervention is the key scaling element to place more devices into service to accelerate value from the Industrial Cloud.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Recorded: Sep 26 2018 45 mins
    Srinivas Kumar Vice President of Engineering, Mocana & Keao Caindec, Vice President of Marketing, Mocana
    Part 3 Securing Firmware Updates and Patches

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new Iot connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Automated Security Lifecycle Management – Mocana TrustCenter Recorded: Aug 29 2018 46 mins
    Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana
    Part 2 - Update Service

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Recorded: Aug 15 2018 46 mins
    Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana
    Part 2 Dangers of Relying on Threat Detection

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new connected world, you need to think about more than just the data and watching hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Securing Containers in IIoT Gateways and Endpoints with TPM 2.0 Recorded: Aug 8 2018 46 mins
    Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana
    Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that includes multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM. This session will cover how Mocana enables the use TPM certified keys to secure Docker containers, LinuX Containers (LXCs) and VMs on industrial IoT gateways and endpoints.
  • Automated Security Lifecycle Management – Mocana TrustCenter Recorded: Jul 25 2018 39 mins
    Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana
    Part 1 Enrollment Service

    Protecting the manufacturing supply chain requires rethinking the way companies develop, manufacture, activate and manage IoT devices. Traditional IT approaches to identity management, enrollment and updates are vulnerable and not scalable. This 3-part webinar series will focus on approaches for making it easier to automate onboarding, enrollment and device management and updates.
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Recorded: Jul 18 2018 40 mins
    Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana
    Part 1 - Securing the Boot Process

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new IoT connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • IoT Security Best Practices: Migrating Away from Open Source Security Recorded: Apr 11 2018 42 mins
    Srinivas Kumar Vice President of Engineering, Mocana & Keao Caindec, Vice President of Marketing, Mocana
    Part 3 – How to Migrate Safely off of Open Source Security and SSL Libraries

    Open source security software has made it easy for developers to get started with securing IoT devices. In this webinar (Part 3 in a 3-part series), you’ll hear from industry experts on how to migrate off of open source security and SSL libraries with Mocana.
  • Endpoint Security Best Practices: Implementing the New Guidance from IIC Recorded: Apr 4 2018 47 mins
    Joe Weiss, Applied Control Solution, LLC, Dean Weber, CTO, Mocana & Keao Caindec, Vice President of Marketing, Mocana
    The industrial Internet Consortium (IIC) has released the Endpoint Security Best Practices (ESBP) document that provides recommendations on the type of security industrial equipment manufacturers and operators should implement on endpoint devices. In this webinar, industry experts will provide an overview of the recommendations and demonstrate how to approach implementing the guidance.
  • IoT Security Best Practices: Migrating Away from Open Source Security Recorded: Mar 28 2018 40 mins
    Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana
    Part 2 – Understanding Compliance and Support Costs

    Open source security software has made it easy for developers to get started with securing IoT devices. In this webinar (Part 2 in a 3-part series), you’ll hear from industry experts on the hidden compliance challenges and support costs of using open source security.
  • IoT Security Best Practices: Migrating Away from Open Source Security Recorded: Mar 14 2018 46 mins
    Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana
    Part 1 – Understanding the Hidden Vulnerabilities and Risks of Open Source Security

    Open source security software has made it easy for developers to get started with securing IoT devices. In this webinar (Part 1 in a 3-part series), you’ll hear from industry experts on the hidden vulnerabilities and risks of using open source security software, especially for resource-constrained devices and IoT.
  • Defending Against HatMan Malware & Cyber Attacks on Industrial Control Systems Recorded: Jan 31 2018 45 mins
    Joe Weiss, Managing Director, Applied Control Solution, LLC and Keao Caindec, Vice President of Marketing, Mocana Corporation
    The Department of Homeland Security (DHS) released a report on the HatMan malware in December 2017. The focus of the malware attack was on key safety control systems used in industrial environments that impact the safety and reliability of mission-critical systems. In this webinar, we will provide you with:

    • An overview of the attack, also known as TRITON or Trisis
    • Identify the defensive mechanisms that failed
    • Provide recommendations and best practices for ensuring the safety and reliability of industrial control and safety systems.

    We look forward to having you join us for this informative session.
  • IoT Security Overview: Threat Detection vs. IoT Device Protection Recorded: Dec 13 2017 22 mins
    Keao Caindec, Vice President of Marketing at Mocana Corporation
    Protecting connected networks and the Internet of Things (IoT) is critical to ensuring data privacy and security of systems. In this webinar, you'll learn about hacking scenarios and defending against common cyber attack vectors. You'll also learn about the important differences between IoT threat detection and device protection and how to reduce your cyber risks.
  • Securing Critical Infrastructure with Advanced Cybersecurity Controls Recorded: Aug 1 2017 46 mins
    Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana
    The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.

    Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.

    In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.
  • Defending IoT Devices Against Ransomware, Viruses and Worms Recorded: Jun 21 2017 45 mins
    Dean Weber, CTO, Mocana
    Cyber attacks are on the rise and becoming more dangerous impacting the safety of smart cities, smart homes and the Industrial IoT. Stuxnet, Black Energy, Mirai, Brickerbot and Wannacry cyber incidents have used a variety of vectors of attack on IoT and industrial control systems made possible by vulnerable devices and a lack of strong cybersecurity controls. Hackers are not just interested in stealing data; they want control and can significantly impact the safety and reliability of systems that affects the risk profile of a company.

    Join this webinar to learn about the:
    - Details of the systems and software that were compromised in recent cyber attacks
    - Common vectors of cyber attack on IoT and industrial control systems
    - How to defend against cyber attacks by leveraging embedded security controls in IoT and ICS devices
    - How create a chain of trust workflow to harden devices and ensure secure communications.

    About the presenter:
    Dean Weber, CTO of Mocana, is an expert in cybersecurity for embedded systems, IoT and industrial control systems. He has more than 30 years of experience in security, cybersecurity and information systems, Dean is a trusted advisor to CISOs at Fortune 1000 companies. Prior to Mocana, he was the CTO of Applied Identity, which was sold to Citrix. He spent several years in the U.S. Navy working in physical and electronic security.
  • Bill Diotte at Bloomberg Breakaway Recorded: May 11 2017 2 mins
    Bill Diotte, CEO Mocana
    Mocana Corporation CEO Bill Diotte discusses the importance of private companies and the government working together on cybersecurity solutions and cultivating talent.
  • Mocana at RSA: Bill Diotte on Securing IoT Networks Recorded: Apr 14 2017 8 mins
    Bill Diotte, CEO, Mocana, Josh Downs, Community Manager, BrightTALK
    Mocana's Bill Diotte for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - The difference between securing IoT networks than tradition enterprise IT networks
    - The role of government regulation in IoT security
    - The 'mission critical' elements that need protecting in IoT networks
    - The threat actors and motives targeting IoT networks
    - The role of cyber warfare in global geo-politics

    About the Speaker:
    William (Bill) Diotte is a technology entrepreneur, CEO and Board Member with over 20 years of experience in working with tech-driven companies from startup stage to Fortune 500. Prior to joining Mocana as Chief Executive, he was the co-founder and CEO of software defined networking pioneer BroadHop Inc., acquired by Cisco. Starting off his career as a manufacturing engineer, he became an executive and managing director with both Gemini and SRI Consulting serving high tech companies in the software and telecom markets. Bill has also served as a Board Member to LiveAction, Inc., and is an investor and advisor to several companies in the software infrastructure and security space.
Mission-critical IoT Security
Mocana provides mission-critical IoT security solutions for embedded systems and the Internet of Things. Our software is used by hundreds of companies to secure millions of IoT endpoints, controllers and gateways. Our comprehensive device-to-cloud platform is designed to operate across complex, multi-vendor environments where performance and security are mission-critical.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IoT Security Best Practices: Migrating Away from Open Source Security
  • Live at: Mar 28 2018 6:00 pm
  • Presented by: Dean Weber, CTO, Mocana and Keao Caindec, Vice President of Marketing, Mocana
  • From:
Your email has been sent.
or close