Logo

Thursday, June 26, 2014 at 10:00 AM PDT / 01:00 PM EDT
 
If you have previously registered for this event, please login here:
 Email
 LOGIN

Registration is required to attend this event. Please register now.
First Name*
Last Name*
Title*
Industry*
Company Size*
Company*
Street Address 1*
Street Address 2
City*
State/Province*
Zip*
Country*
Phone*
Email*
NEW!... Early Registration!
 Check here if you would like to automatically be registered for webinars on the same topic
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
 
Please enable Cookies in your browser before registering for the webcast.
 
*Denotes required.
 
REGISTER
As more and more devices are becoming connected, threats to data and other cyber attacks are becoming more prevalent. The U.S. government is taking a more active role in protecting connected devices and new regulations are afoot. This one hour webinar will introduce participants to security concerns for M2M and IoT programs and provide the tools that you will need to assess your vulnerabilities and what you must to do protect your information.

Topics covered include:
  • Understanding what you can and cannot secure and at what cost
  • How to assess what is "secure enough" for your M2M or IoT application
  • The "risk points" for M2M and IoT applications
  • Unique security issues for M2M and IoT programs
  • How to plan for the future in terms of scaling and longevity of your program.


Presenter

Syed Zaeem Hosain
Chief Technical Officer
Aeris Communications




Moderator

Carl Ford
Community Developer Mobility TechZone
Crossfire Media