Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

action image header it logic
Forums it-sa Expo Knowledge Forum B

Strengthening IoT Security: The Crucial Role of Authentication

Strong authentication is crucial for IoT device security, vital for data exchange, control, and lifecycle management.

calendar_today Tue, 22.10.2024, 16:20 - 16:30

event_available On site

place Forum, Booth 6-235

Action Video

south_east

Action description

south_east

Themes

Endpoint Protection Identity and access management Industry 4.0 / IoT / Edge Computing

Key Facts

  • Robust authentication is key to IoT security.#Strong authentication is vital throughout IoT lifecycle.#PKI and certificates have weaknesses in IoT security.

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

When it comes to IoT device security we believe proper and robust authentication is the
corner stone of any software security stack to be further developed on the device. Before you
want to send data to or receive data from the sensors of a IoT device, before you want to
control its critical actuators to perform, sometimes even life defining operations, we believe
you first want to have strongly authenticated the device with which you believe you are
communicating or controlling. This is valid for the operational aspect of an IoT device during
its life-time, but equally important for the provisioning and decommissioning. Certificates
and PKI infrastructure appears to be the “go-to solution” for IoT device authentication, but
these comes with their issues and weaknesses. How to mitigate these issues and weaknesses
is becoming a pressing question.
... read more

Downloads

Language: English

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.