The Tortoise & the Hare: IoT Security & The Cyber Physical World

  • Date 06 Jun 2019

The Tortoise & the Hare: IoT Security & The Cyber Physical World

06 Jun 2019, 10:00 - 10:25

Strategy Talks
Language:
English (United Kingdom)

As an industry, we are not doing enough with our expertise to support vulnerable, yet converging, networks across the region, to catch up with advancing IoT technology stacks. But, as the story goes, the tortoise can win the race.

Reggie Best, President of Lumeta, a FireMon company, discusses how corporate and government networks can win the IoT security race, examining “Industry 4.0”, the convergence of corporate and industrial networks, the role of threat intelligence in securing IT/OT networks, and the stages of securing IoT, including real-time network visibility and leak-path detection, segmentation analytics and validation, and real-time breach detection.

Learning Outcomes:

  1. Common IoT security challenges, including: dramatically expanding attack surfaces and vulnerabilities, a lack of understanding by employees regarding how IP-based devices can be compromised, underdeveloped security policies, and a lack of visibility into the number of IoT devices on corporate networks.
  2. The stages of securing IoT, including real-time network visibility and leak-path detection, segmentation analytics and validation, and real-time breach detection.
  3. The role of threat intelligence in securing IT/OT networks
  4. Changing and updating security policies with IoT in mind
  5. How to “get ahead” instead of “playing catch up” when managing developing IoT stacks

 

Contributors

  • Reggie Best

    Speaker

    President

    Lumeta (a FireMon company)

    Reggie has a technology background with BE and MS degrees in EE and more than 25 years of experience in communications, networking and IT security....

Business Issues covered

  1. What will this session help you to do?
    • Ensure information security projects demonstrate return on investment‎
    • Understand internal and external threats and keep a business secure‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.