Menu

IoT FEATURE NEWS

New Approaches to Cybersecurity Necessary in the Age of IoT

By Laura Stotler January 25, 2016

Risk management and threat assessment are absolutely critical as the Internet of Things (IoT) creates opportunities and security challenges for organizations. As companies and end users become increasingly connected, processes and technologies must be in place to monitor and manage a huge number of connected devices and applications.

GreyCastle Security is in the business of risk management and operational security and understands why organizations need to adopt a systematic approach when it comes to cybersecurity. GreyCastle CEO Reg Harnish is set to bring that message to the IoT community this week, and will be engaging with participants at the ITEXPO and IoT Evolution events in Ft. Lauderdale.

“Corporate America is taking a beating from a security perspective,” said Harnish. “A staggering increase in cybercrime coupled with increased government regulations have left most businesses vulnerable to both auditors and hackers. With greater connectivity comes more exposure, and while some may view that as a risk, we think it’s an opportunity to re-think the way companies protect their assets and their people.”

Harnish will be leading two conference sessions designed to educate companies and administrators about new approaches to mobile and cybersecurity in the age of IoT. “Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile Insecurity” will be presented tomorrow, January 26 at the IoT Evolution Conference at 3:45 p.m. ET. The conference session will focus on the rise of the smartphone and how its pervasiveness has created serious security and privacy risks, many of which are unknown and unmanaged by companies and IT teams.

The “Cybersecurity as a Service – Faster, Easier and Better” session will take place at MSP Expo (collocated at ITEXPO) on Wednesday, January 27 at 2 p.m. ET. Harnish will discuss the value of Managed Security Services (MSS) and how they have transformed the approach to security and mitigated business risks in the age of IoT.

“Yesterday’s cybersecurity solutions won’t address tomorrow’s threats,” added Harnish. “At ITEXPO, we’ll discuss a systematic approach to identifying vulnerabilities, and we’ll identify processes that can eliminate them before they cause problems.”    




Edited by Kyle Piscioniere

IoTevolutionworld Contributing Editor

SHARE THIS ARTICLE
Related Articles

Smart Cities for All: City Leaders in Brazil Discuss Accessibility

By: Ken Briodagh    9/25/2017

Rio de Janeiro has invited G3ict and World Enabled to assist with the city's efforts to ensure that persons with disabilities and older persons can be…

Read More

The Future of the IoT: From Smart Cities to Cyborgs

By: Special Guest    9/25/2017

The IoT is the largest technological expansion in the history of humankind and will lead to the creation of cities controlled by artificial intelligen…

Read More

CIS Controls Says Its Best Practices Could Prevent Equifax-style Breach

By: Ken Briodagh    9/25/2017

According to CIS, attacks such as WannaCry and Equifax could have been prevented.

Read More

Pros and Cons of IoT: Why Some Businesses Are Slow to Adopt

By: Special Guest    9/22/2017

Why won't business leaders recognize the boons of IoT and bring IoT devices into the workplace? The answer seems to be: Speed.

Read More

IoT Evolution Health: Areta Health in South Africa to Use Medsphere Healthcare Solutions

By: Ken Briodagh    9/22/2017

Network of Areta Specialist Day Hospitals supported by remote clinics and in-home monitoring brings Medsphere's EHR and services to the African contin…

Read More