
Sign up to save your podcasts
Or


In this conversation, Dr. Zero Trust, Anne Saunders, and Jack discuss the complexities of cybersecurity, particularly in the context of IoT and operational technology. They explore the vast attack surface presented by IoT devices, the challenges of securing these devices, and the importance of embedding security into the design of technology. The discussion also touches on regulatory frameworks, investment trends in cybersecurity, and the future of IoT security solutions.
Takeaways
IoT represents a significant attack surface for cybersecurity.
Embedding security into device design is crucial.
Data collection from IoT devices poses security risks.
Regulatory compliance is becoming more stringent with NIS2.
Investment in cybersecurity is often driven by immediate results.
The cost of breaches can have a tangible impact on businesses.
AI is changing the landscape of cybersecurity discussions.
Supply chain security is a critical component of IoT security.
Static credentials are a major vulnerability in cybersecurity.
A holistic approach to cybersecurity is necessary for effective protection.
By Dr. Chase Cunningham5
77 ratings
In this conversation, Dr. Zero Trust, Anne Saunders, and Jack discuss the complexities of cybersecurity, particularly in the context of IoT and operational technology. They explore the vast attack surface presented by IoT devices, the challenges of securing these devices, and the importance of embedding security into the design of technology. The discussion also touches on regulatory frameworks, investment trends in cybersecurity, and the future of IoT security solutions.
Takeaways
IoT represents a significant attack surface for cybersecurity.
Embedding security into device design is crucial.
Data collection from IoT devices poses security risks.
Regulatory compliance is becoming more stringent with NIS2.
Investment in cybersecurity is often driven by immediate results.
The cost of breaches can have a tangible impact on businesses.
AI is changing the landscape of cybersecurity discussions.
Supply chain security is a critical component of IoT security.
Static credentials are a major vulnerability in cybersecurity.
A holistic approach to cybersecurity is necessary for effective protection.

229,674 Listeners

2,011 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

317 Listeners

8,876 Listeners

8,077 Listeners

175 Listeners

315 Listeners

73 Listeners

10,254 Listeners

139 Listeners

26,679 Listeners