Securing the Edge
Facebook Twitter LinkedIn

Securing the Edge

Combined Session
Friday, May 13, 2022 11:30—12:30
Location: B07-08

Enabling MFA and SSO for IoT and Constrained Devices

Constrained devices without a browser and keyboard typically have a major disadvantage in the user experience of logging in. As more and more smaller and less capable devices move online, we shouldn’t be relying on outdated and insecure methods of connecting these devices to our accounts. Using OAuth can overcome these limitations, providing IoT and other similar devices with the ability to leverage MFA and SSO without adding complexity to the devices themselves. This session will provide an overview of all the different ways these types of devices can securely connect to accounts.

Enabling MFA and SSO for IoT and Constrained Devices
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Enabling MFA and SSO for IoT and Constrained Devices
Presentation deck
Enabling MFA and SSO for IoT and Constrained Devices
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Aaron Parecki
Aaron Parecki
IndieWebCamp
Aaron Parecki is the co-founder of IndieWebCamp and a Senior Security Architect at Okta with over 20 years of experience in the industry. He is the author of OAuth 2.0 Simplified, maintains...

OT Patch Management Best Practices

Securing critical infrastructures and OT environments against attackers, requires more than anywhere else to think like them, especially because OT still provides a garden full of low hanging fruits. Where, in traditional IT environments, patching, even if not always easy, is doable and it has become a main priority in IT security trainings to point out the importance of keeping up with patch levels.  Unfortunately, patching in OT environments is much harder for many reasons, i.e. due to incompatible hardware or missing approval from asset owners. 

In this session we will talk about OT Patch Management Best Practices like inventory management, definition of criticality levels and the prioritization of patch deployment.  

OT Patch Management Best Practices
Event Recording
OT Patch Management Best Practices
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
OT Patch Management Best Practices
Presentation deck
OT Patch Management Best Practices
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Fulup Ar Foll
Fulup Ar Foll
IoT.bzh
Fulup Ar Foll holds a Master in Computer Science from the Military French School ESAT. His career started with ten years of research on embedded operating systems. He then joined the Industry;...

Navigating the OT World – Selecting a Solution to Suit

As more organizations adopt OT and IoT devices more companies are providing solutions to manage new IoT devices and get control of legacy OT infrastructure. Unprecedented device discovery tools are now available, monitoring tools can now passively or actively monitor devices and intrusion detection capabilities are unprecedented. But it could mean a change to the core management structure in the company.

Navigating the OT World – Selecting a Solution to Suit
Event Recording
Navigating the OT World – Selecting a Solution to Suit
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Navigating the OT World – Selecting a Solution to Suit
Presentation deck
Navigating the OT World – Selecting a Solution to Suit
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Graham Williamson
Graham Williamson
KuppingerCole
Graham Williamson is a senior Analyst at KuppingerCole. Graham has practical experience in the identity management and access control industry having completed assignments in the academic,...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address