Many enterprises are being asked to incorporate consumer IoT technologies into their enterprise security architecture in ways that can seriously impact security and privacy. This discussion will examine successes and pitfalls attendees have observed when deploying IoT technologies into their enterprise infrastructure.
1: Discuss how to evaluate risks raised by consumer IoT devices in enterprise environments.
2: Explore how to plan security architecture for enterprise IoT deployments.
3: Discuss challenges of integrating consumer IoT devices into enterprise AuthX infrastructure.
Mobile & IoT Security
access control practitioner perspectives privacy security operations Internet of Things
Share With Your Community