Internet of Things devices deliver incredible capabilities but also raise a number of significant security concerns. This Security School offers expert advice on securing IoT devices, to help infosec professionals ensure the connected devices that end users deploy do no harm to enterprise security.
Expert Dan Sullivan review key elements of securing IoT, including authentication and anomaly detection, and covers the points in an IoT device's lifecycle that warrant special attention, from deployment to decommissioning. In-depth coverage is also given to the work of two professional alliances concerned with standards for securing Internet of Things.
Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned about securing IoT devices. Passing the quiz earns you one CPE credit from (ISC)².
View our Security School Course Catalog to view more lessons eligible for CPE credits.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Understanding Internet of Things security
The Internet of Things is an exciting and exhilarating opportunity, but is not without its own set of security concerns. To maintain Internet of Things security, several well-known safety measures -- and a few new ones -- must be adopted and maintained.
In this exclusive tip, podcast and video, Sullivan explains five key elements to securing IoT, offers pointers for starting IoT security in the enterprise, and discusses how the Open Internet Consortium and Thread Group are helping address the lack of widespread Internet of Things security standards.
Internet of Things security issues must be considered prior to deploying an enterprise IoT initiative. Explore the key elements of IoT security and the IoT lifecycle. Continue Reading
To enjoy the fruits of the Internet of Things' labors, security for IoT must be taken seriously. Here are five key steps to getting the job done. Continue Reading