The audience for this webinar includes owners of IoT systems, decision makers, security leaders
in various verticals, business risk managers, system integrators, architects, security assessors,
analysts, policy and regulatory authorities, and other stakeholders concerned about the proper
strategy for the implementation of mature security practices tailored to the needs and
constraints of the specific IoT system.
Those using this SMM should be able to determine and clearly communicate to management the
answers to the following questions:
• Given the organizational requirements and threat landscape, what is my solution’s target
maturity state?
• What is my solution’s current maturity state?
• What are the mechanisms and processes that will take my solution’s maturity from its
current state to its target state?