channel company logo

Device Authority - IoT Security

Trust for every Thing

Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human
intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and
  • 6,306 Subscribers
  • 101 talks
  • 5 series

Trust for every Thing

Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human
intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and
  • 6,306 Subscribers
  • 101 talks
  • 5 series

On-demand talks

The Authority On... Introducing DA Academy

The Authority On... Introducing DA Academy

In this episode of The Authority On, we delve into the DA Academy, a key initiative from Device Authority. This podcast features insightful discussions with
Steve Huehmer (VP, Customer Success) and John Hynds (Director, Customer Success). They explore the purpose and benefits of the Academy, how it
empowers professionals in the cybersecurity and IoT space, and its growing impact on bridging knowledge gaps. Whether you're a seasoned professional o…

A Spotlight On The Unknown: Delivering Complete Visibility Of Unmanaged Devices And Their Vulnerabilities

A Spotlight On The Unknown: Delivering Complete Visibility Of Unmanaged Devices And Their
Vulnerabilities

KeyScaler Discovery empowers organizations to uncover vulnerabilities, gain full visibility into unmanaged device activity, and address security gaps with
actionable insights. Designed for simplicity and effectiveness, this tool provides the clarity and data you need to secure your network.

WP29 and R155: Driving Compliance in Automotive

WP29 and R155: Driving Compliance in Automotive

Join industry experts from Microsoft, CyberArk, and Device Authority for an insightful webinar on WP.29 and R155 automotive cybersecurity regulations. As
vehicles become increasingly connected, compliance is no longer just a manufacturing concern—it now extends across the entire vehicle lifecycle, including
software updates, security monitoring, and end-of-life management. In this session, Kaivan Karimi (Microsoft), Brian Carpenter (CyberArk), and Paul Lockle…

The Authority On... What's the Emergency? Public Safety in a World of IOT and Cybersecurity

The Authority On... What's the Emergency? Public Safety in a World of IOT and Cybersecurity

How are IoT, drones, and emerging technologies transforming public safety and emergency response? Join us in this fascinating conversation with David
Ihrie, CTO of the Virginia Innovation Partnership Corporation (VIPC), as we explore the integration of IoT in critical infrastructure and public safety. In this
episode, David shares his insights on: *The evolving role of IoT sensors in emergency response and disaster preparedness *How drones are revolutionizing …

The Authority On... Insights into the Past, Present, and Future with John Moor IoT SF

The Authority On... Insights into the Past, Present, and Future with John Moor IoT SF

Join us as we dive deep into the evolution of IoT security with John Moor from the IoT Security Foundation. In this episode, we explore the critical milestones in
IoT security, discuss current challenges and innovations, and uncover what the future holds for IoT technology. Whether you’re an IoT professional, tech
enthusiast, or simply curious about cybersecurity, this episode is packed with insights on how we can secure our connected world. Don’t miss out—hit subsc…

The Authority On... KeyScaler-as-a-Service (KSaaS) 7.2

The Authority On... KeyScaler-as-a-Service (KSaaS) 7.2

Join us as we discuss the basics of KSaaS, the key benefits of KSaaS for industries like automotive, medical, and energy and what can we expect from the
latest 7.2 upgrade.

Closing Remarks and Future Outlook

Closing Remarks and Future Outlook

Join James Penny, CTO at Device Authority, as he brings Day 2 of the Device Authority Virtual Summit to a close. Reflect on the insightful discussions
surrounding Zero Trust in the era of AI that have unfolded over the past two days. Gain valuable insights into the future of cybersecurity and the role of AI in
shaping trust and security paradigms. Don't miss this opportunity to conclude our summit with key takeaways and actionable insights to propel your organiz…

OT Heuristics: Thinking Fast & Thinking Slow in OT

OT Heuristics: Thinking Fast & Thinking Slow in OT

This session will discuss the drivers for building situational awareness and context-driven insights applying machine learning and behavioral analytics to OT
and ICS networks. Danielle will discuss the instinct to react to alerts and detections, and drill into what works and what doesn’t work for rules based
detections and signature recognition in OT/ICS networks. She will also discuss what is and is not built into monitoring tech today vs. what’s coming, including…

Series