Date: 27 Aug 2020, Thursday
Time: 11am – 12.15pm GST
Almost everyday there is a newly publicly discovered vulnerability, a breach in security in a famous company, a leak of data or a news about a hacker spying on one’s family. Vulnerabilities in IoT products are not a “if” but a “when?”; So it is necessary for companies to set policies and processes to handle it. How to categorize and understand these vulnerabilities? How common are they? Can your business avoid them at minimal cost?
ABOUT INTERNET OF THINGS (IOT)
As the world gets increasingly connected through the internet, it is getting less costly to manufacture products with Wi-Fi capabilities and sensors built in. As a result, we are see more and more IoT products appear on the market. IoT can refer to any devices that is connected to the internet and have the ability to "talk" to other connected devices as well. These devices can range from smartphones and wearables to household appliances to simple sensors.
IMPORTANCE OF INTERNET OF THINGS (IOT) CYBERSECURITY VULNERABILITY
Understanding what are the different type of vulnerabilities is an essential step of awareness in your company to build more secure products. You will learn to identify the most common weakness in IoT products, which framework can help your company to handle it in a structured way (internally and publicly with your customers) and how to evaluate the severity of the weakness to prioritize the remediation.
KNOWLEDGE SHARING THROUGH COMPLIMENTARY WEBINAR
To help you understand Internet of Things, TÜV SÜD’s experts will cover all the key aspects of IoT cybersecurity vulnerability and how to deal with these vulnerabilities.
Date: 27 Aug 2020
Time: 11 am GST
Duration: 1 Hour 15 min
Speakers: TÜV SÜD’s Experts
POINTS TO BE COVERED IN THE WEBINAR
- Top 10 IoT Vulnerabilities
- Reporting and disclosure of vulnerabilities
- Scoring vulnerabilities
- Q&A Session
WHO SHOULD ATTEND THIS WEBINAR
This webinar is especially useful and relevant for the following group but not limited to:
BUSINESS BENEFITS OF INTERNET OF THINGS (IOT) CYBERSECURITY VULNERABILITY
- Raise Awareness internally– Communicate clearly what are danger associated with your IoT products
- Gain competitive edge – by mitigating efficiently vulnerabilities
- Minimize risk – by identifying products cybersecurity weakness early in the lifecycle
We strongly recommend that you join this webinar to understand the Consumer IoT Cybersecurity Vulnerability introduction. This introductory session with TÜV SÜD will help answer the questions and challenges company are facing in this new area.