Architecting Security for the Internet of Things

As the Internet of Things (IoT) becomes a broader reality in business, IT and security professionals are being challenged to find ways to secure Internet-enabled technology in all types of non-computer devices. How can an enterprise IT department develop and manage an effective security strategy for IoT technology? In this webcast, experts discuss the most effective approaches to securing the embedded systems used in their enterprise and offer advice on monitoring and protecting next-generation IoT technology.

Available:
On Demand
Duration:
1h 00min

When you attend this webinar, you will:

  • Get an overview of best practices for security IoT technology in your enterprise
  • Learn about potential threats to IoT systems and devices
  • Gain insight on how to integrate IoT security into your broader enterprise cybersecurity strategy
  • Learn more about currently-available IoT security tools and technology
  • Find out how to assess and monitor the security of IoT devices attached to your enterprise network

Featured Speakers

  • Paul Brager Jr
    Paul Brager Jr
    Director, Global OT Security Programs
    Baker Hughes

    Regarded as a thought leader and expert in the cyber security community for twenty-seven (27) years, Mr. Brager has deep expertise evaluating, securing, and defending critical infrastructure and manufacturing assets (ICS, IoT, and IIoT). As a speaker, author, and researcher, Paul seeks to move the conversation forward surrounding industrial control systems (ICS), Industrial Internet of Things, supply chain and automation cyber and ways to mitigate the attack surface in heterogenous environments. He has provided commentary on several security related podcasts, publications, and webinars that provided guidance and insight into strategies for critical infrastructure protection, IT/OT convergence, and IIoT (industrial internet of things). In his current role as Director, Global OT Security Programs at Baker Hughes, he is accountable for security posture, architecture and design of Baker Hughes’ global manufacturing ecosystem, as well as development and maturation of the OT security program in a manner that adopts a risk based approach to increasing availability, while reducing the overall attack surface of those environments. Mr. Brager holds a BS in Political Science from Texas A&M University, a MS in Administration of Justice and Security from University of Phoenix and is an Alpha Phi Sigma (National Criminal Justice Honor Society) and Sigma Alpha Pi leadership inductee. Paul has a passion for mentoring and guiding persons of color and advocating for women aspiring to contribute to the advancement of the industry and promoting diversity within the cyber community.

  • Sonal Shetkar
    Sonal Shetkar
    Principal Sales Engineer
    ExtraHop

    Sonal Shetkar supports key enterprise accounts in the New York Metro Area for ExtraHop, which helps organizations understand and secure their environments by analyzing all network interactions in real time and leveraging machine learning to identify threats, deliver critical applications, and secure investments in the hybrid cloud. Her expertise lies in application performance, network traffic analytics, cybersecurity/forensic incident response, cloud architecture among others. Her role is a cross between engineering and sales, and drives product adoption. After completing her undergraduate studies in electronics and telecommunications in Mumbai, she attended Columbia University to complete an M.S. in Electrical Engineering. She is an active Women in Tech ambassador and manages many local Girls in STEM and Women in Security chapters. She is also the NYC chapter leader for WoSec and Women in CyberJutsu (WSC). She is an active alumna at Columbia and currently lives in Williamsburg, Brooklyn with her husband and mini-aussie, Orochimaru.

  • Tim Wilson
    Tim Wilson
    Editor in Chief and Co-Founder
    Dark Reading

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

Sponsored By