How to protect IoT devices during manufacturing stage with secure provisioning

Logo
Presented by

Brian Colgan, EPS Global and Paul Lockley, Device Authority

About this talk

The Internet of Things (IoT) is transforming our homes, cars, hospitals, businesses and public spaces – mostly for the better – but without suitable precautions (security, privacy) IoT devices can be an attractive target for malicious actors and cyberattacks. When embarking on an IoT project, or designing a new connected device or product, it’s important to factor in security early on. The potential impact of an IoT security breach is forcing a suitable security model from the design and manufacturing phase which supports secure production; the secure provisioning of root keys and certificates at the time of manufacturing, secure mastering, and a foundation for secure updates. Join our webinar to learn more about: • The challenges and risks of IoT • The need for a Secure by Design approach • Guideline and solutions to mitigate the risks • Real world examples We are delighted to be joined by EPS Global. There will be an opportunity to ask the speakers questions during the live session. If you’re watching on demand and have a question, please email info@deviceauthority.com
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (98)
Subscribers (6192)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.