IoT Resources
Security and privacy remain chief concerns for IoT developers. Thinkstock

IoT Product Design: Don’t Make It Easy for the Hackers

This webinar explains how to avoid leaving your IoT product vulnerable to cyber-attacks.

Date & Time

Event Type

Cost

Tuesday, February 07, 2017, 2 p.m. Eastern Webinar Free

Inherent to connected products is their ability to work with other connected products, providing increased functionality to the user. But as more products are connected within the ecosystem along with adding remote functionality, the risk to leaving your IoT product vulnerable to cyber-attacks is compounded.

It is incumbent on all manufacturers of IoT products to ensure they are not the weakest link in the ecosystem; allowing unsecured entries to breach into other connected products in the system. Hackers may not want the data your product collects, but they may desperately want the data that your product is connected to.

Additionally, just because you can add functionality to a product that can be implemented remotely, should you? Exploring the security risks upfront during product design and development is imperative.

In this webinar, we will discuss:

  • Making the connection between Interoperability, Functionality, and Security
  • Understanding security risks and how to minimize without compromising product design
  • Importance of conducting vulnerability assessments
  • Understanding hackers’ objectives and how it impacts your product’s risk
  • The need for having a plan in place for monitoring and take counteraction if a breach is detected

Intertek has been a leading provider of Assurance, Testing, Inspection and Certification solutions to industries throughout the world. The company recently announced the acquisition of EWA-Canada, a cyber security and assurance services provider. In operation for nearly 30 years, they have an unparalleled reputation for delivering cyber security and assurance services to a broad range of industries and government agencies globally. Their expertise includes product security evaluations, penetration testing, solution architecture and design, and cyber threat analysis for critical infrastructure. 

Presented by:

 

 
   

>>Check out the Webinar