Webinar: Standards, Legislation and Regulation – the next steps for IoT security

How well does the industry address IoT security?
How aware are you about upcoming regulations and legislation?
What steps have you taken to address IoT security for your own products?

Vulnerable to Attack

With over 40 billion smart devices connected across the globe, industry players and governments must protect the billions of customers and their private data, as well as businesses and governments that are vulnerable to attack. David Rogers, CEO of Copper Horse Ltd joins Jimmy Jones, Head of Security at ZARIOT, for an in depth discussion on today’s fraud and security challenges, what laws and regulations are in place, and the responsibilities we bear in shepherding the next generation of IoT customers through an ever-changing landscape. The webinar recording is now available to watch.

Bad Actors Exploit Security Loopholes

The mobile industry has been leading the charge in IoT security, having experience with similar standards that have been in place to protect the cellular domain for decades. However, there are lots of new vendors entering the smart devices market who don’t have experience in cybersecurity, nor do they know how to pick hardware and software packages from reliable players. This means that the majority of IoT vendors don’t even take basic measures like disclosing the vulnerabilities to security investigators, allowing bad actors to operate longer in the shadows and prey on new victims.

Holistic approach to security

Individual governments have made their own regulations and laws to protect networks and data, usually around aligned standards and shared concepts, which provide consistency. In this webinar David Rogers discusses in depth the ETSI EN regulations which include common sense protocols such as managed vulnerability reports, not having default passwords, and required software updates. The 13 points laid out by David Rogers allow for a holistic approach to security, with all players participating in the solutions, and governments providing encouraging carrots rather than punitive sticks.

In this wide ranging webinar, you learn about the “root of trust” that is essential to provide the security infrastructure for the interconnected internet of things.

What next?

In this webinar, you learn:

  • The vast vulnerabilities present in our current “Wild West” of IoT
  • The 13-point regulation framework that will ensure privacy and security in all IoT devices
  • How industry can take the reins of regulation through smart, ethical steps and avoid punitive government measures restricting development
David Rogers MBE
CEO – Copper Horse

David is a mobile phone and IoT security specialist who runs Copper Horse Ltd, a software and security company based in Windsor, UK. His company is currently focusing on product security for the Internet of Things as well as future automotive cyber security.

David chairs the Fraud and Security Group at the GSMA and sits on the Executive Board of the Internet of Things Security Foundation. He authored the UK’s ‘Code of Practice for Consumer IoT Security’, in collaboration with UK government and industry colleagues and is a member of the UK’s Telecoms Supply Chain Diversification Advisory Council.

He has worked in the mobile industry for over twenty years in security and engineering roles. Prior to this he worked in the semiconductor industry.

David holds an MSc in Software Engineering from the University of Oxford and a HND in Mechatronics from the University of Teesside. He lectured in Mobile Systems Security at the University of Oxford from 2012-2019 and served as a Visiting Professor in Cyber Security and Digital Forensics at York St John University.

He was awarded an MBE for services to Cyber Security in the Queen’s Birthday Honours 2019.

He blogs from https://mobilephonesecurity.org and tweets @drogersuk

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>