Discover Security Events in Iot Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
IoT Security has become a critical concern as the number of connected devices approaches 30 billion globally by 2025, creating an unprecedented attack surface spanning consumer electronics, industrial systems, healthcare devices, and critical infrastructure. These devices often lack basic security controls, making them attractive targets for cybercriminals and nation-state actors.
IoT devices face multiple vulnerabilities including weak default credentials, lack of encryption, insecure firmware updates, and inadequate access controls. The convergence of IT, operational technology (OT), and IoT creates complex security challenges as organizations struggle to gain visibility and control over diverse device ecosystems (msspalert.com). Botnets like Mirai have demonstrated how compromised IoT devices can be weaponized for massive distributed denial-of-service attacks, while sophisticated adversaries target industrial IoT systems to disrupt manufacturing, energy, and transportation infrastructure.
Organizations face significant challenges securing IoT deployments including device inventory management, vulnerability patching for resource-constrained devices, network segmentation, and monitoring billions of endpoints. Many IoT devices cannot support traditional security agents, requiring alternative protection strategies. Managed security service providers are developing specialized capabilities to help organizations secure IoT environments as these systems become integral to business operations (iflockconsulting.com).
The industry is developing IoT-specific security standards, certification programs, and regulatory requirements. Manufacturers are implementing secure-by-design principles, hardware root of trust, and secure boot mechanisms. Organizations are adopting zero-trust network architectures, micro-segmentation, and IoT security platforms that provide discovery, risk assessment, and anomaly detection capabilities tailored to connected device environments.
All security events are automatically streamed into this table on a daily basis.
23rd April 2025 | Connected, Compliant, and Secure: Practical Third-Party Risk Management for Medical IoT
The event "Connected, Compliant, and Secure: Practical Third-Party Risk Management for Medical IoT" provided valuable insights into managing third-party risks in medical IoT environments. Attendees appreciated the expert speakers who shared practical strategies for ensuring compliance and security. The sessions were well-structured, offering actionable advice on integrating IoT devices while maintaining data protection. Networking opportunities allowed participants to connect with industry peers, enhancing the overall experience and fostering collaboration in the field.
Online • Part of Cylera
23rd April 2025 | Connected, Compliant, and Secure: Practical Third-Party Risk Management for Medical IoT
The event "Connected, Compliant, and Secure: Practical Third-Party Risk Management for Medical IoT" provided valuable insights into managing third-party risks in medical IoT environments. Attendees appreciated the expert speakers who shared practical strategies for ensuring compliance and security. The sessions were well-structured, offering actionable advice on mitigating vulnerabilities. Networking opportunities allowed participants to connect with industry peers, fostering collaboration. Overall, the event was highly informative and beneficial for professionals in the medical IoT sector.
Online • Part of Cylera
22nd April 2025 | The Future of CPS Protection: A Gartner® Magic Quadrant™ Leader Perspective
The Future of CPS Protection: A Gartner® Magic Quadrant™ Leader Perspective offers insightful discussions on the evolving landscape of cybersecurity for cyber-physical systems. Industry leaders share their expertise on emerging threats and innovative protection strategies. Attendees gain valuable knowledge on integrating advanced technologies to safeguard critical infrastructure. The event is well-organized, providing a platform for networking and collaboration among professionals. Overall, it is a must-attend for those focused on CPS security advancements.
Online • Part of Claroty
22nd April 2025 | The Future of CPS Protection: A Gartner® Magic Quadrant™ Leader Perspective
The Future of CPS Protection: A Gartner® Magic Quadrant™ Leader Perspective provided insightful discussions on the evolving landscape of cybersecurity for cyber-physical systems. Industry leaders shared strategies for enhancing protection measures, emphasizing the importance of innovation and collaboration. Attendees appreciated the expert analysis and practical solutions presented. The event successfully highlighted emerging threats and the need for adaptive security frameworks, making it a valuable experience for professionals seeking to stay ahead in cybersecurity.
Online • Part of Claroty
9th April 2025 | Mitigation Strategies for OT Exposures in Cyber-Physical Systems
The "Mitigation Strategies for OT Exposures in Cyber-Physical Systems" event provided valuable insights into safeguarding operational technology. Experts shared practical strategies to identify and mitigate vulnerabilities in cyber-physical systems. The sessions were well-structured, offering a blend of theoretical knowledge and real-world applications. Attendees appreciated the interactive discussions and case studies, which enhanced understanding of complex security challenges. Overall, the event was informative and beneficial for professionals seeking to enhance their cybersecurity measures.
Online • Part of Claroty