Posted on
in Presentations
Current methods for provisioning IoT device credentials can leave networks vulnerable to unauthorized devices and devices vulnerable to being taken over by unauthorized networks. This session will discuss how trusted network-layer onboarding can improve the security of IoT devices and integrate with attestation, application-layer onboarding, and MUD to protect devices throughout their lifecycles.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community