Internet of Things
Security Congress Abstract
Security is something that everyone attending Security Congress is familiar with. The need to protect infrastructure, networks and data is a tried-and-true message that has been stated over and over. However, what about the devices that integrate with your network? Those devices that provide new functionality or do not fall under the purview of information security programs? Have they been accounted for in your strategy?
This session will identify loopholes in security plans and the inefficiency that current processes pose. In addition, we will look at non-vendor-specific solutions and what organizations can do to address these termites that are eating away at networks. From development to deployment, what can be done to inoculate your data?