IoT Security

Managing IoT Security

Managing IoT Security

IoT devices enabled by analytics and AI, sensing, reactions, and adjustments no longer need human attention, intervention, or awareness. And, with companies deploying many tens of thousands of such devices and endpoints, the attack surface is growing exponentially. What should enterprise security leadership do to proactive plan and manage the security of their IoT network?

Contributor

    • Alma R.Cole, Chief Information Security Officer, US Customs and Border Protection, Department of Homeland Security

Download Podcast

Apple Podcast, Google Podcast, Spotify, Pandora, iHeartRadio, SoundCloud, TuneIn, and Stitcher. Find other syndication channels here or search CIO Talk Network podcast on any other app.

Contributors

Alma R.Cole

Alma R.Cole, Chief Information Security Officer, US Customs and Border Protection, Department of Homeland Security

As the Chief Information Security Officer (CISO) for US Customs and Border Protection, Alma R. Cole is responsible for all aspects of the CBP Cybersecurity program, including security architecture, risk management, policy compliance, and de... More   View all posts

Advertisement

Sovos 1 MPU 300X250
Alma R.Cole

Login


Not Member Yet?
Register

Register

  • Name

  • Contact Info

  • About Yourself

  • Minimum length of 8 characters
  • Upload
  • Location

  • Professional Background

  • Other Social Profiles

  • Areas of Interest