Building and Maintaining an Effective IoT Cybersecurity Strategy

The Internet of Things (IoT) is much bigger than appliances in business contexts, as tools and non-computer devices are increasingly connected to the Internet. And attackers are taking advantage of these Internet-enabled technologies to target corporate data and systems. How can an enterprise IT department develop and manage an effective security strategy for IoT technology? In this webcast, experts discuss the most effective approaches to securing the embedded systems and industrial systems used in their enterprise. You will learn strategies to apply security to things that weren’t designed to consider security. You will receive advice on monitoring and protecting next-generation IoT technology.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Discover which IoT devices have been targeted for compromise by bad actors.
  • Learn how to fine-tune your security strategy to embrace end-points not typically associated with IT networks.
  • Find new ways to measure your risk profile, as well as defend against common IoT vulnerabilities.
  • Be better equipped to monitor, manage, and protect IoT devices from inside the security operations center.

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • James Dyckowski
    James Dyckowski
    Technical Specialist – Microsoft Defender for IoT
    Microsoft

    James has many years of technology experience in storage, RAID, virtualization, SAN, NAS, Linux and DB applications. Dyckowski also spent 9 years with American Megatrends, Inc.'s StorTrends Data Storage Division. Next, with Turbonomic, showed customers how to control the various pieces of enterprise infrastructure to applications for performance and efficiency. Migrated to D2iQ (Mesosphere), taking enterprise applications to containers and micro-services within a true hybrid cloud control plane. Now, he digs into IoT/OT security solutions with CyberX (now Microsoft). Dyckowski received a bachelor’s degree in computer science from the University of Georgia and his Master of Business Administration degree from Shorter University.

  • Terry Sweeney
    Terry Sweeney
    Moderator
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World, SearchAWS.com, and Stadium Tech Report.

Sponsored By