What’s Needed to Secure the IoT & IIoT
Mark Weatherford (vArmour) | Robert M. Lee (Dragos) | Jennifer Minella (Carolina Advanced Digital)
Watch the recording at http://bit.ly/2rKZjiW
Internet of Things devices are built with cost & convenience in mind, not security. This makes them easy targets for cybercriminals looking to exploit their vulnerabilities and infiltrate your systems. With IoT adoption on the rise, organizations are looking for ways to improve security at all levels and limit the damage IoT-powered cyber attacks can cause. The stakes are even higher for the Industrial Internet of Things (IIoT).
Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
– IoT as a gateway to your systems
– Key factors for building a successful security strategy encompassing the IoT & IIoT
– Threats targeting the IoT / IIoT
– Industrial threat detection and response
– Recommendations for improving security
Speakers:
– Mark Weatherford, Chief Cybersecurity Strategist, vArmour
– Robert M. Lee, CEO, Dragos
– Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital
Join us for the first of our Thursday Tech Talk series with the Carolina Advanced Digital crew. In this episode, we have a friend from Mist joining us to talk about returning safely to work with contact and proximity tracing inside the organization, how it’s different than the public-private app partnerships, and then we’ll hop over to a demo of Mist’s AI-based Wi-Fi, show you what’s going on in our office, and offer a sneak peek at some upcoming news.
Join Tech Talk episode 4 with the Carolina Advanced Digital crew. In this episode, Jen along with Dan and Mark (or whoever she can grab) will take a look back at the chaos of COVID-19 as organizations scrambled to work through remote access and the cleanup we need to do afterwards. Hosted by Jennifer Minella.
eRate 2021: Fortinet Solutions Overview for K12 (firewalls, remote access, and more). Based on your pre-event survey of topic interests, we’ll talk about some or all of the following:
- Firewalls, filtering, and gateway security
- When and how to use sandbox technology for K12
- Email security
- When and why you need SSL inspection
- Secure remote access
- SD-WAN
- Other security, NAC, SIEM
- Q&A