Secure Technology Alliance Two-part Webinar Series to Explore IoT Security Approaches and Best Practices

Secure Technology Alliance Two-part Webinar Series to Explore IoT Security Approaches and Best Practices

Topics include PKI for securing the IoT ecosystem and trusting data at the edge of the IoT network

PRINCETON JUNCTION, N.J., April 18, 2019 – It’s estimated that there will be more than 64 billion internet-connected devices by 2025. But many implementations have prioritized easier, faster deployments over security. With the rapidly increasing number of IoT devices and services coming to market, it’s important that IoT implementers and vendors consider basic security principles. The Secure Technology Alliance is hosting a two-part webinar series to provide best practices for protecting data and securing IoT devices throughout the entire IoT ecosystem.

The first webinar in the series will be held on May 16, 2019 at 1pm ET/10am PT. To register for the full series, visit https://www.securetechalliance.org/security-in-the-iot-ecosystem-webinar-series/. Attendees who participate in both webinar sessions and take a short online post-session quiz will receive a certificate of completion from the Secure Technology Alliance.

“There’s been a meteoric rise in the number of IoT devices on the market, and now the industry is playing catch-up with security,” said Randy Vanderhoof, executive director of the Secure Technology Alliance. “It’s critical that IoT implementers, product vendors and service providers understand the elements needed to secure the IoT and every internet-connected device. This series will explain security features, approaches and best practices for securing the IoT including the use of public key infrastructure and management of IoT data collected or stored at the edge.”

“The Role of PKI in IoT” Webinar – May 16, 2019 at 1pm ET/10am PT

The first webinar in the series, “The Role of PKI in IoT,” will be led by Josh Jabs VP, CTO and GM IoT Solutions, Entrust Datacard. Attendees will learn how public key infrastructure (PKI) can play a role in securing the IoT ecosystem and get best practices implementation.

“Trusting Data at the Edge” Webinar– May 22, 2019 at 2pm ET/11am PT

The second webinar, “Trusting Data at the Edge,” will be led by Sri Ramachandran VP, Americas Head of IoT & Mobility Solutions and Services, G+D Mobile Security. This webinar will cover the security requirements for trusting and managing data collected and/or stored at the edge of the IoT network and approaches for ensuring data integrity, privacy and authenticated access control.

This series was developed by the Alliance’s IoT Security Council – a member-driven forum where all industry stakeholders can discuss applications and security approaches, develop best practices and advocate for the use of standards for IoT security implementations. The council welcomes participation from organizations involved in the many IoT ecosystems to participate in these efforts, as well as to network and share implementation experiences. More information about the council is available at https://www.securetechalliance.org/activities-councils-internet-of-things-security/.

Additional IoT Resources

For more information on securing the IoT, the Secure Technology Alliance has the following resources:

TWEET THIS: The time to #secure the #IoT is now – @SecureTechOrg is hosting a webinar series on IoT #security features + best practices starting May 16 2pm ET/11am PT. Register here: https://www.securetechalliance.org/security-in-the-iot-ecosystem-webinar-series/.

About the Secure Technology Alliance

The Secure Technology Alliance is the digital security industry’s premier association. The Alliance brings together leading providers and adopters of end-to-end security solutions designed to protect privacy and digital assets in payments, mobile, identity and access, healthcare, transportation and the emerging Internet of Things (IoT) markets.

The Alliance’s mission is to stimulate understanding, adoption and widespread application of connected digital solutions based on secure chip and other technologies and systems needed to protect data, enable secure authentication and facilitate commerce.

The Alliance is driven by its U.S.-focused member companies. They collaborate by sharing expertise and industry best practices through industry and technology councils, focused events, educational resources, industry outreach, advocacy, training and certification programs. Through participation in the breadth of Alliance activities, members strengthen personal and organizational networks and take away the insights to build the business strategies needed to commercialize secure products and services in this dynamic environment.

For more information, please visit www.securetechalliance.org.

Contact

Megan Shamas or Adrian Loth
Montner Tech PR
203-226-9290
[email protected]
[email protected]