Endpoint Security , Internet of Things Security

Manufacturing IoT Security: 'Where Do We Start?'

Entrust's David Low on Where to Start Addressing Overlooked Gaps
David Low, worldwide director of professional services, Entrust Data Protection Solutions

Companies building intelligent devices are often driven by market pressure, OEM requirements and aggressive time-to-market demands. As these products are designed and sold, the security aspect of these devices can sometimes be short-changed - resulting in potential security issues, business risk and potential loss of market share.

Typically, when manufacturing enterprises start to address IoT cybersecurity, there are the needs they know they have - and then the ones of which they are completely unaware. Entrust's David Low shares what needs to be done and where best to begin

In this exclusive video interview with Information Security Media Group, Low discusses the common requirements and issues that surround an IoT ecosystem from a security perspective, and offers advice about how to start managing them, such as:

  • An understanding of typical security requirements and issues for IoT devices;
  • How the OEM/Supplier relationship affects IoT device security;
  • The key elements of an IoT security system.

As worldwide director of professional services for Entrust Data Protection Solutions, Low is responsible for the worldwide delivery of applied cryptographic solutions, including PKI, data protection and Hardware Security Module-based solutions for nCipher. Prior to his work at Entrust, he built and led a centralized services group for GuidePoint Security, focusing on the SIEM and network security space. He also worked at RSA Security for 10 years, building and leading a team of product specialist sales engineers. During that time, he developed a solution for card data tokenization for a large card processor and led the technology integration team for the joint partnership. Today, that solution is one of the most commercially successful payment-based data protection solutions.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.