987 Views
Internet of Things
Security Congress Abstract
Thomas Graham
Chief Information Security Officer
CynergisTek
Cory Blacketer
Information Security Consultant
CynergisTek
Security is something that everyone attending Security Congress is familiar with. The need to protect infrastructure, networks and data is a tried-and-true message that has been stated over and over. However, what about the devices that integrate with your network? Those devices that provide new functionality or do not fall under the purview of information security programs? Have they been accounted for in your strategy?
This session will identify loopholes in security plans and the inefficiency that current processes pose. In addition, we will look at non-vendor-specific solutions and what organizations can do to address these termites that are eating away at networks. From development to deployment, what can be done to inoculate your data?