
Sign up to save your podcasts
Or


In this conversation, Dr. Zero Trust, Anne Saunders, and Jack discuss the complexities of cybersecurity, particularly in the context of IoT and operational technology. They explore the vast attack surface presented by IoT devices, the challenges of securing these devices, and the importance of embedding security into the design of technology. The discussion also touches on regulatory frameworks, investment trends in cybersecurity, and the future of IoT security solutions.
Takeaways
IoT represents a significant attack surface for cybersecurity.
Embedding security into device design is crucial.
Data collection from IoT devices poses security risks.
Regulatory compliance is becoming more stringent with NIS2.
Investment in cybersecurity is often driven by immediate results.
The cost of breaches can have a tangible impact on businesses.
AI is changing the landscape of cybersecurity discussions.
Supply chain security is a critical component of IoT security.
Static credentials are a major vulnerability in cybersecurity.
A holistic approach to cybersecurity is necessary for effective protection.
By Dr. Chase Cunningham5
77 ratings
In this conversation, Dr. Zero Trust, Anne Saunders, and Jack discuss the complexities of cybersecurity, particularly in the context of IoT and operational technology. They explore the vast attack surface presented by IoT devices, the challenges of securing these devices, and the importance of embedding security into the design of technology. The discussion also touches on regulatory frameworks, investment trends in cybersecurity, and the future of IoT security solutions.
Takeaways
IoT represents a significant attack surface for cybersecurity.
Embedding security into device design is crucial.
Data collection from IoT devices poses security risks.
Regulatory compliance is becoming more stringent with NIS2.
Investment in cybersecurity is often driven by immediate results.
The cost of breaches can have a tangible impact on businesses.
AI is changing the landscape of cybersecurity discussions.
Supply chain security is a critical component of IoT security.
Static credentials are a major vulnerability in cybersecurity.
A holistic approach to cybersecurity is necessary for effective protection.

229,837 Listeners

2,008 Listeners

370 Listeners

373 Listeners

649 Listeners

1,027 Listeners

320 Listeners

8,852 Listeners

8,108 Listeners

176 Listeners

315 Listeners

73 Listeners

10,224 Listeners

139 Listeners

26,664 Listeners