Industrial IoT Security: Securing Manufacturing and Supply Chain: A Feature Report and Webinar from Enterprise IoT Insights

Share Article

Take a deep dive into the pitfalls and practicalities of Industrial IoT security

News Image
“The security industry is losing the IoT security battle. Every season brings additional connected devices, but many of these low-cost connected items aren’t brought to market with security in mind.” David Dufour, vice president of engineering and cyber-security, Webroot

The industrial IoT will usher in a fourth industrial revolution, and raise a storm. Manufacturing and distribution businesses anchored by old systems and processes will be drowned by the rising tide; those that transform their operations will catch a sail.

But it presents great risk, as well as great opportunity. The industrial IoT represents uncharted waters with unknowable threats. The most significant of these is digital security. As factories and warehouses – once isolated and secured – become increasingly connected, and hackers become increasingly sophisticated, so new attack vectors and vulnerabilities will emerge.

This report, titled Industrial IoT security--the pitfalls and practicalities of securing manufacturing and supply chain IoT systems, considers what is at stake for manufacturing and supply chain businesses, describes vulnerabilities in the industrial IoT stack and associated business processes, and recommends practical steps to minimize security breaches.

And be sure to check out the accompanying webinar, which considers what is at stake for manufacturing and supply chain businesses, describes vulnerabilities in the industrial IoT stack and associated business processes, and recommends practical steps to minimize security breaches.

The panel of experts includes:
James Blackman, Contributor, Enterprise IoT Insights
Brian Arbuckle, Senior Market Analyst, IHS Markit
Jay Thoden van Velzen, Director IoT Security, SAP
Stephane Quetglas, EIoT Marketing Director, Gemalto

For a break-out look at specific topics, read the following articles:
IIoT security: How to securely connect legacy OT systems
A review of the latest IIoT security regulations and guidelines
IIoT security: How to establish a supply chain of trust
IIoT security: Why devices are the weakest link in the IoT stack
IIoT security: The top 10 security vulnerabilities

About Enterprise IoT Insights:
Enterprise IoT Insights is presented by RCR Wireless News, a leader in telecom news and media since 1982. Enterprise IoT Insights focuses on what many industry analyst and investors have termed as the “next mega trend” or “4th Industrial Revolution” that will make the industrial revolution of the 1800s look like a blip on the radar screen. In addition to identifying and explaining the latest enterprise IoT trends and technologies, Enterprise IoT Insights will feature, showcase and demonstrate, virtually and in-person, the communications service provider and enterprise use cases, proof of concepts (PoC), product selections and career opportunities driving $11 trillion of anticipated economic growth.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Jeff Mucci
@EIoTinsights
Follow >
Follow us on
Visit website