New Approaches to Cybersecurity Necessary in the Age of IoT

By Laura Stotler January 25, 2016

Risk management and threat assessment are absolutely critical as the Internet of Things (IoT) creates opportunities and security challenges for organizations. As companies and end users become increasingly connected, processes and technologies must be in place to monitor and manage a huge number of connected devices and applications.

GreyCastle Security is in the business of risk management and operational security and understands why organizations need to adopt a systematic approach when it comes to cybersecurity. GreyCastle CEO Reg Harnish is set to bring that message to the IoT community this week, and will be engaging with participants at the ITEXPO (News - Alert) and IoT Evolution events in Ft. Lauderdale.

“Corporate America is taking a beating from a security perspective,” said Harnish. “A staggering increase in cybercrime coupled with increased government regulations have left most businesses vulnerable to both auditors and hackers. With greater connectivity comes more exposure, and while some may view that as a risk, we think it’s an opportunity to re-think the way companies protect their assets and their people.”

Harnish will be leading two conference sessions designed to educate companies and administrators about new approaches to mobile and cybersecurity in the age of IoT. “Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile Insecurity” will be presented tomorrow, January 26 at the IoT Evolution Conference at 3:45 p.m. ET. The conference session will focus on the rise of the smartphone and how its pervasiveness has created serious security and privacy risks, many of which are unknown and unmanaged by companies and IT teams.

The “Cybersecurity as a Service – Faster, Easier and Better” session will take place at MSP Expo (collocated at ITEXPO) on Wednesday, January 27 at 2 p.m. ET. Harnish will discuss the value of Managed Security Services (MSS) and how they have transformed the approach to security and mitigated business risks in the age of IoT.

“Yesterday’s cybersecurity solutions won’t address tomorrow’s threats,” added Harnish. “At ITEXPO, we’ll discuss a systematic approach to identifying vulnerabilities, and we’ll identify processes that can eliminate them before they cause problems.”    




Edited by Kyle Piscioniere


Original Page