|
 |
|
This webinar was originally broadcast on: Tuesday, April 24, 2018 02:00 PM EDT / 11:00 AM PDT
|
 |
|
The potential for widely distributed IoT devices to streamline operations is vast, but so are the security implications. From branch sites and vehicles to M2M and IoT deployments in the wild, IoT is creating the biggest attack surfaces that IT teams have ever seen.
Mirai botnets, WannaCry, and other well-publicized incidents illustrate the breadth of today’s IoT threats, which are too prevalent and advanced to address with traditional security tools. Many organizations are recognizing the need for software-defined, policy-based security solutions that isolate IoT devices and protect organizations' most valuable data — regardless of the WAN source.
What attendees will learn:
- IoT security challenges
- Best practices for mitigating IoT security risks
- How Software-Defined Perimeter technology is changing the way IoT networks are secured
- How to create a perimeter-secured overlay network for IoT devices in about 5 minutes
Who should attend:
- Network administrators who need IoT security options that can be deployed and managed from anywhere
- CIOs interested in saving reducing costs, man-hours, and complexities surrounding IoT security
Presenters
Ken Hosac IoT Strategy and Business Development Cradlepoint
|
Brandon Ashey Infrastructure and Security Manager Cradlepoint
|
Moderator
Carl Ford CEO and Co-Founder Crossfire Media
|
|
|
|
 |