The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
As wearables, AR, and connected healthcare devices become ubiquitous, people are increasingly reliant on nonstop, secure connectivity for health, information, and entertainment. With this great convenience comes great risk; some threats are obvious and some quite subtle. In this discussion, we’ll examine the three key links in the chain, potential weaknesses and how to secure them:
Endpoint devices themselves
The communication network, increasingly 5G
Back-end cloud services, including ZTA impact
As these are often provided by different entities, standards and interoperability become important, but each of these links is subject to risks and limitations imposed by the other. In this presentation, we’ll discuss the best practices for secure design and validation at each step to ensure a trusted and reliable hyper-connected world.
Learning Objective:
Understand the risk factors across IOT deployments of any scale, starting at the individual devices then the network then the back-end cloud services that power them.