Like a chain, your product’s security is only as strong as its weakest link. Even the simplest connected device provides a broad range of attack surfaces for an attacker. The considerations for a typical IoT product involve ensuring the security of hardware, embedded software, cloud services, and app/web interfaces.
Join our security webinar on July 15th at 11:00 MDT (10:00 Pacific, 1:00 Eastern) to learn about different approaches and their trade-offs. Experts from three cyber-security and engineering companies will share their advice for ensuring your products are more secure. The discussion will consider end-to-end security from architecture through the complete product life cycle.
- Howdy Pierce – Cardinal Peak co-founder and chairman; visiting instructor of Ethical Hacking at Carnegie Mellon University, Africa
- Trent Hein, CCIE, CISSP, ISSMP, ISSAP, CSSA, GSNA – Co-founder of enterprise cyber-security firm Rule4; speaker and bestselling author
- Josh Datko – Chief Engineer at Cryptotronix, a niche embedded device security consulting firm; author and Black Hat Trainer
Space is limited. Click here to sign up!