Securing the Edge
Facebook Twitter LinkedIn

Securing the Edge

Combined Session
Friday, May 13, 2022 11:30—12:30
Location: B07-08

Enabling MFA and SSO for IoT and Constrained Devices

Constrained devices without a browser and keyboard typically have a major disadvantage in the user experience of logging in. As more and more smaller and less capable devices move online, we shouldn’t be relying on outdated and insecure methods of connecting these devices to our accounts. Using OAuth can overcome these limitations, providing IoT and other similar devices with the ability to leverage MFA and SSO without adding complexity to the devices themselves. This session will provide an overview of all the different ways these types of devices can securely connect to accounts.

Aaron Parecki
Aaron Parecki
Aaron Parecki is the co-founder of IndieWebCamp and a Senior Security Architect at Okta with over 20 years of experience in the industry. He is the author of OAuth 2.0 Simplified, maintains...

OT Patch Management Best Practices

Securing critical infrastructures and OT environments against attackers, requires more than anywhere else to think like them, especially because OT still provides a garden full of low hanging fruits. Where, in traditional IT environments, patching, even if not always easy, is doable and it has become a main priority in IT security trainings to point out the importance of keeping up with patch levels.  Unfortunately, patching in OT environments is much harder for many reasons, i.e. due to incompatible hardware or missing approval from asset owners. 

In this session we will talk about OT Patch Management Best Practices like inventory management, definition of criticality levels and the prioritization of patch deployment.  

Fulup Ar Foll
Fulup Ar Foll
Fulup Ar Foll holds a Master in Computer Science from the Military French School ESAT. His career started with ten years of research on embedded operating systems. He then joined the Industry;...

Navigating the OT World – Selecting a Solution to Suit

As more organizations adopt OT and IoT devices more companies are providing solutions to manage new IoT devices and get control of legacy OT infrastructure. Unprecedented device discovery tools are now available, monitoring tools can now passively or actively monitor devices and intrusion detection capabilities are unprecedented. But it could mean a change to the core management structure in the company.

Graham Williamson
Graham Williamson
Graham Williamson is a senior Analyst at KuppingerCole. Graham has practical experience in the identity management and access control industry having completed assignments in the academic,...


On-Demand Access
Re-live EIC 2022
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address