Open top menu
Tuesday, 7 July 2015

InformationWeek

The Internet of Things, the Software Supply Chain and Cybersecurity


Register Now

Date: Wednesday, July 15, 2015
Time:
12:00 PM ET/ 9:00 AM PT

Duration: 60 min

LIVE STREAMING VIDEOCAST

The number of connected devices is set to explode, with Gartner forecasting it will reach 25 billion by 2020 – of which 250 million will be connected vehicles.

The Internet of Things (IoT) affects virtually every industry and domain in our society including our homes, health, hospitals, factories and critical infrastructure as well as our planes, trains and automobiles.

We're not just talking about fitness trackers and smart TVs anymore – IoT-enabled devices now include industrial machinery, patient diagnostic machines and corporate door-locking systems.

And this new binding of the digital and physical worlds means that, for the first time in history, cyberattacks can easily traverse from the digital domain to the physical realm and impact our physical assets and safety. This has been shown in numerous hacks on medical devices as well as in the 2014 cyberattack on a German blast furnace.

As enterprises increasingly rely on digital technology to drive their businesses, CISOs and CIOs must begin to understand the direction and critical implications of cybersecurity for the IoT.

Join Dark Reading for a live-streamed videocast featuring two of the industry's best-known voices: Chris Eng, VP of Research at Veracode and former NSA engineer; and Josh Corman, CTO of Sonatype and former security strategist at Akamai and IBM Internet Security Systems.

You'll get first-hand insights into key questions such as:

  • How does the scale and complexity of the IoT lead to changes in the way we develop software applications and assess them for risk?
  • As software increasingly becomes assembled from reusable third-party and open source components and frameworks, how do we minimize risk from the software supply chain?
  • What is a basic cybersecurity checklist for developing secure IoT systems (e.g., encryption, authentication, segmentation, patching mechanisms, etc.)?
  • What are other attack surfaces beyond the endpoint device itself (web and mobile apps, back-end cloud services, etc.)?
  • With so many different platforms and protocols, how do you assess the maturity of suppliers in your supply chain?
  • What role should industry standards and government regulations play?
Register Today

Webinar Sponsored by:


Speakers:

Speaker
Chris Eng
Vice President of Research
Veracode

Speaker
Joshua Corman
CTO
Sonatype

Speaker
Eric Ogren
Principal Analyst
Ogren Group

 
 

System Requirements and Technical Support


You are subscribed as wangkeeree.tech@blogger.com

TO UNSUBSCRIBE:

You are receiving this email because you provided UBM Tech with your email address.
To opt-out of any future Webcasts offer from Dark Reading please click here.

PRIVACY NOTICE
UBM Tech takes your privacy seriously.
To learn more, please read our
Privacy Policy

FOR FURTHER COMMUNICATION, PLEASE CONTACT:
Customer Service
UBM Tech
2 Penn Plaza, 15th Floor
New York, NY 10121

 


Tagged
Different Themes
Written by Templateify

Aenean quis feugiat elit. Quisque ultricies sollicitudin ante ut venenatis. Nulla dapibus placerat faucibus. Aenean quis leo non neque ultrices scelerisque. Nullam nec vulputate velit. Etiam fermentum turpis at magna tristique interdum.

0 comments