Endpoints in the IoT by nature are vulnerable to many kinds of attacks and exploits. Widely vetted security approaches can help close these vulnerabilities while also protecting networks and data that is stored in the cloud. This webcast, hosted by Trusted Computing Group and its members GlobalSign and Cisco, will illustrate key techniques for closing critical IoT security gaps in a number of applications and endpoints.
Part one of the webcast will examine critical security concerns that an IoT provider needs to address. These include authentication, privacy and integrity. Attendees will learn how to mitigate risks in securing trust credentials using public key infrastructure (PKI) and the international standards-based Trusted Platform Module.
In part two, TCG experts will look at the example of smart buildings, in which endpoints must be checked for integrity, allowed safely on a network and exchange data with the cloud – all securely and without the introduction of malware or other attacks. In this example, the techniques and technologies can be applied to many endpoints, which will be addressed.
Attendees will learn key vulnerabilities of IoT endpoints, networks and data and learn how to secure them using widely available tools and technologies.
Securing IoT Endpoints, Networks and the Cloud
When: Tuesday, September 20, 2016 12:00pm ET/ 9:00am PT
Length: 60 Minutes
Where: BrightTalk – Register Today
The event is free, but registration is required to attend.