Trusted Internet of Things Device Onboarding and Lifecycle Management


Posted on in Presentations

Current methods for provisioning IoT device credentials can leave networks vulnerable to unauthorized devices and devices vulnerable to being taken over by unauthorized networks. This session will discuss how trusted network-layer onboarding can improve the security of IoT devices and integrate with attestation, application-layer onboarding, and MUD to protect devices throughout their lifecycles.


Participants
Eliot Lear

Speaker

Principal Engineer, Cisco / Enterprise Chief Technology Office

Susan Symington

Speaker

Computer Scientist, The MITRE Corporation

Mobile & IoT Security Product Security

authentication Internet of Things network security orchestration & automation


Topic

Subtopic


Share With Your Community