Menu

IoT FEATURE NEWS

New Approaches to Cybersecurity Necessary in the Age of IoT

By

Risk management and threat assessment are absolutely critical as the Internet of Things (IoT) creates opportunities and security challenges for organizations. As companies and end users become increasingly connected, processes and technologies must be in place to monitor and manage a huge number of connected devices and applications.

GreyCastle Security is in the business of risk management and operational security and understands why organizations need to adopt a systematic approach when it comes to cybersecurity. GreyCastle CEO Reg Harnish is set to bring that message to the IoT community this week, and will be engaging with participants at the ITEXPO and IoT Evolution events in Ft. Lauderdale.

“Corporate America is taking a beating from a security perspective,” said Harnish. “A staggering increase in cybercrime coupled with increased government regulations have left most businesses vulnerable to both auditors and hackers. With greater connectivity comes more exposure, and while some may view that as a risk, we think it’s an opportunity to re-think the way companies protect their assets and their people.”

Harnish will be leading two conference sessions designed to educate companies and administrators about new approaches to mobile and cybersecurity in the age of IoT. “Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile Insecurity” will be presented tomorrow, January 26 at the IoT Evolution Conference at 3:45 p.m. ET. The conference session will focus on the rise of the smartphone and how its pervasiveness has created serious security and privacy risks, many of which are unknown and unmanaged by companies and IT teams.

The “Cybersecurity as a Service – Faster, Easier and Better” session will take place at MSP Expo (collocated at ITEXPO) on Wednesday, January 27 at 2 p.m. ET. Harnish will discuss the value of Managed Security Services (MSS) and how they have transformed the approach to security and mitigated business risks in the age of IoT.

“Yesterday’s cybersecurity solutions won’t address tomorrow’s threats,” added Harnish. “At ITEXPO, we’ll discuss a systematic approach to identifying vulnerabilities, and we’ll identify processes that can eliminate them before they cause problems.”    




Edited by Kyle Piscioniere

IoTevolutionworld Contributing Editor

SHARE THIS ARTICLE
Related Articles

Google and the Future of Machine Learning and AI at the IoT Evolution Expo

By: Ken Briodagh    12/18/2018

We spoke to Ricardo Prada, UX Director at Google, and upcoming keynoter at the IoT Evolution Expo, about his session on the future of Machine Learning…

Read More

Nearing the Start of a New Year, Cybeats Closes on $3M in Funding

By: Arti Loftus    12/18/2018

Cybeats, a cybersecurity company protecting Internet of Things (IoT) devices, announced this week it has raised $3 million to expand their team in Tor…

Read More

Processing the Impact of Qualcomm

By: Carl Ford    12/18/2018

Qualcomm's release of the 9205 chip is a reduction in size to half of the 9206 chip and reduces power consumption by 70 percent. As for processing, it…

Read More

IoT in Health Podcast S.1 Ep.8 Healthy Nevada Project

By: Ken Briodagh    12/13/2018

On this episode of the monthly IoT in Health Podcast, Ken Briodagh sits down with Jim Metcalf, Chief Data Scientist, Healthy Nevada Project, to talk a…

Read More

Capitalize on the Promise of IoT Automation by Mastering the Basics

By: Special Guest    12/13/2018

According to Bsquare's IoT Maturity Index, there are five stages commonly associated with IIoT technology adoption.

Read More