Community Tip - Visit the PTCooler (the community lounge) to get to know your fellow community members and check out some of Dale's Friday Humor posts! X
The emergence of IoT has brought a dramatic increase in productivity and new business opportunities. However, an IoT approach that lacks an end-to-end to security approach that includes elements such as strong device authentication, encryption and data signing, could lead to leaked data and result in business-disrupting or life-threatening outcomes.
In this session, attendees heard about real world case studies from industries such as home automation, healthcare and industrial IoT on how these industries are strengthening their security efforts to safeguard connected devices. These case studies provided an understanding on the next-generation of IoT security practices that could address vulnerabilities in your connected devices.