The Internet of Things, the Software Supply Chain and Cybersecurity

The Internet of Things, the Software Supply Chain and Cybersecurity

LIVE STREAMING VIDEOCAST

Available On Demand
Duration 60min
Speakers
Chris Eng
Vice President of Research
Veracode
Chris Eng
Chris Eng is Vice President of Research at Veracode. In this role, he leads the team responsible for integrating security expertise into all aspects of Veracode’s technology. Throughout his career, he has led projects breaking, building, and defending web applications and commercial software for some of the world’s largest companies. Chris is a frequent speaker at premier industry conferences, where he has presented on a diverse range of topics, including cryptographic attacks, agile security, mobile application security, and security metrics. He has been interviewed by Bloomberg, Fox Business, CBS, and other media outlets worldwide.
Joshua Corman
CTO
Sonatype
Joshua Corman
Joshua Corman is the Chief Technology Officer for Sonatype. Previously, he served as a security researcher and strategist at Akamai Technologies, The 451 Group, and IBM Internet Security Systems. A respected innovator, he co-founded Rugged Software and IamTheCavalry, to promote new security approaches in response to the world’s increasing dependence on digital infrastructure. His unique approach to security, in the context of human factors, adversary motivations and social impact, has helped position him as one of the most trusted names in security. He is also an adjunct faculty member for Carnegie Mellon’s Heinz College, IANS Research and a Fellow at the Ponemon Institute.
Eric Ogren
Principal Analyst
Ogren Group
Eric Ogren
Eric Ogren is principal analyst of the Ogren Group, an independent industry analyst firm concentrating on cyber-security. Eric’s background features over 20 years of executive management contributions for security vendors such as RSA and OKENA, as well as security industry analyst experiences.

Ogren holds a B.S. degree in mathematics from the University of Massachusetts and an M.S. degree in Computer Science from Boston University.

Eric can be reached by sending mail to eric@ogrengroup.com.

The number of connected devices is set to explode, with Gartner forecasting it will reach 25 billion by 2020 – of which 250 million will be connected vehicles.

The Internet of Things (IoT) affects virtually every industry and domain in our society including our homes, health, hospitals, factories and critical infrastructure as well as our planes, trains and automobiles.

We’re not just talking about fitness trackers and smart TVs anymore – IoT-enabled devices now include industrial machinery, patient diagnostic machines and corporate door-locking systems.

And this new binding of the digital and physical worlds means that, for the first time in history, cyberattacks can easily traverse from the digital domain to the physical realm and impact our physical assets and safety. This has been shown in numerous hacks on medical devices as well as in the 2014 cyberattack on a German blast furnace.

As enterprises increasingly rely on digital technology to drive their businesses, CISOs and CIOs must begin to understand the direction and critical implications of cybersecurity for the IoT.

Join Dark Reading for a live-streamed videocast featuring two of the industry’s best-known voices: Chris Eng, VP of Research at Veracode and former NSA engineer; and Josh Corman, CTO of Sonatype and former security strategist at Akamai and IBM Internet Security Systems.

You’ll get first-hand insights into key questions such as:

  • How does the scale and complexity of the IoT lead to changes in the way we develop software applications and assess them for risk?
  • As software increasingly becomes assembled from reusable third-party and open source components and frameworks, how do we minimize risk from the software supply chain?
  • What is a basic cybersecurity checklist for developing secure IoT systems (e.g., encryption, authentication, segmentation, patching mechanisms, etc.)?
  • What are other attack surfaces beyond the endpoint device itself (web and mobile apps, back-end cloud services, etc.)?
  • With so many different platforms and protocols, how do you assess the maturity of suppliers in your supply chain?
  • What role should industry standards and government regulations play?
Already a member? Login