Back to All Events

Securing Your IoT, OT, and IoMT Devices

 

Time Zone: EST

The Key to Maintaining a Secure, Compliant Environment

across your entire estate of IoT, OT, and IoMT devices


With billions of smart devices in use today, there are 10 times more xIoT devices worldwide than all traditional endpoints combined. Most of these devices – including IoT, OT, IoMT, and IIoT Cyber-Physical Systems – are unknown, unmanaged, and unmonitored, posing significant security risks.

These devices typically operate with weak credentials, old, vulnerable firmware, extraneous services, and problematic certificates. And, legacy scanners and passive, detection-based discovery solutions cannot discover, classify, manage, and remediate fundamental security and hygiene issues. Even with so many vulnerable devices, many organizations today still need to understand what xIoT devices they have and who should manage them. So, the challenge of finding, fixing, and managing these devices has left an enormous attack surface targeted by threat actors, nation-states, and ransomware gangs.

In this discussion, we’ll help you take control of your devices. We’ll detail findings from over six years of threat research across millions of Cyber-Physical Systems, demonstrate how you can get a handle on your xIoT estate, recognize where the devices are most vulnerable, and employ strategies to protect them at scale.

 

FEATURED SPEAKER

John Vecchi

Phosphorus Cybersecurity

As Chief Marketing Officer at Phosphorus Cybersecurity, John's achieved more than 25 years of experience in high-tech security marketing, strategy, product marketing, product management, and consulting. A serial CMO and security visionary, he has helped build and lead some of the biggest brands in enterprise security, including Solera Networks, Blue Coat Systems, Check Point Software, McAfee, Zscaler, Anitian, ColorTokens, and Anonyome Labs. Throughout his career, John's been featured at events and conferences worldwide, built an award-winning security podcast titled "Security on Cloud," and wrote as a featured columnist at SECURITYWEEK, writing about advanced threats and big data security.

 
 

Thank You to Our Premier Partner:

Phosphorus Cybersecurity


Would you like a personal introduction to a Premier Speaker or Partner? Let Us Know >
Are you interested in becoming a Premier Partner?
Contact Us >

Previous
Previous
June 6

Comprehensive Cloud Email Security: Moving Beyond Just Phishing Protection To Protect Data in Your Mailboxes

Next
Next
June 12

Exploring the Core of Physical Security: Safeguarding People and Assets With AI