
Sign up to save your podcasts
Or


In this conversation, Dr. Zero Trust, Anne Saunders, and Jack discuss the complexities of cybersecurity, particularly in the context of IoT and operational technology. They explore the vast attack surface presented by IoT devices, the challenges of securing these devices, and the importance of embedding security into the design of technology. The discussion also touches on regulatory frameworks, investment trends in cybersecurity, and the future of IoT security solutions.
Takeaways
IoT represents a significant attack surface for cybersecurity.
Embedding security into device design is crucial.
Data collection from IoT devices poses security risks.
Regulatory compliance is becoming more stringent with NIS2.
Investment in cybersecurity is often driven by immediate results.
The cost of breaches can have a tangible impact on businesses.
AI is changing the landscape of cybersecurity discussions.
Supply chain security is a critical component of IoT security.
Static credentials are a major vulnerability in cybersecurity.
A holistic approach to cybersecurity is necessary for effective protection.
 By Dr. Chase Cunningham
By Dr. Chase Cunningham5
77 ratings
In this conversation, Dr. Zero Trust, Anne Saunders, and Jack discuss the complexities of cybersecurity, particularly in the context of IoT and operational technology. They explore the vast attack surface presented by IoT devices, the challenges of securing these devices, and the importance of embedding security into the design of technology. The discussion also touches on regulatory frameworks, investment trends in cybersecurity, and the future of IoT security solutions.
Takeaways
IoT represents a significant attack surface for cybersecurity.
Embedding security into device design is crucial.
Data collection from IoT devices poses security risks.
Regulatory compliance is becoming more stringent with NIS2.
Investment in cybersecurity is often driven by immediate results.
The cost of breaches can have a tangible impact on businesses.
AI is changing the landscape of cybersecurity discussions.
Supply chain security is a critical component of IoT security.
Static credentials are a major vulnerability in cybersecurity.
A holistic approach to cybersecurity is necessary for effective protection.

227,737 Listeners

2,000 Listeners

370 Listeners

375 Listeners

638 Listeners

1,018 Listeners

322 Listeners

8,505 Listeners

8,010 Listeners

175 Listeners

314 Listeners

73 Listeners

9,822 Listeners

134 Listeners

26,666 Listeners