Breaking the IoT Adoption Barrier — End-to-End Trust, Integrity, and Control
FREE ON-DEMAND RECORDING
Solutions for Establishing Root of Trust Across IoT
The Internet of Things (IoT) is transforming industries across a wide range of applications. From agriculture, manufacturing to healthcare and everywhere in between, existing business models are being disrupted, enabling efficiencies never before seen, and creating new opportunities and customer experiences. However, notwithstanding these upbeat prospects, challenges remain creating barriers to rapid adoption, particularly among security-conscious organizations. Establishing TRUST across the entirety of expansive architectures is of particular concern. What if there was a way to securely achieve this kind of trust and rapidly deploy it at enterprise scale?
Join Chuck White, CTO at Fornetix, encryption key management solution providers, and Juan Asenjo, PH.D., CISSP of nCipher, pioneers in the development of hardware security modules (HSMs), for an informative session on how to break these barriers by extending controls from the customer data center through the cloud to the edge of network with a robust root of trust to hold cryptographic keys.
Learn More About:
• Identifying the security challenges that can hold back IoT deployments
• Innovative technology designed to unleash the full potential of encryption
• Automatic key management practices to ensure scalable IoT deployments
• Establishing a root of trust with certified HSMs for regulatory compliance
Chief Technology Officer
Former U.S. Army officer & combat veteran, with extensive knowledge in cyber-defense, collaboration solutions, big data analytics and security software development. Member of OASIS’ KMIP and OpenC2 Technical Committees and is a co-editor of version 2.0 of the KMIP Specification.
|Juan C. Asenjo, PH.D., CISSP
Juan has worked in the information security field for over 25 years in government, military, and the private sector. As Senior Manager at nCipher Security, he brings to market innovative cryptographic integrations that use identity management, authentication, and encryption to help customers use security as an enabler for digital transformation. Holding a Ph.D. in Information Science, a Masters’ in Business, and a Bachelors’ in Engineering, Juan helps technology companies reach more customers with integrated solutions that reduce risk and enhance security