Foundations of IoT Security

Webinar Series: Securing the Internet of Things: Safeguarding Connectivity in a Connected World

Securing the Internet of Things (IoT) is crucial because it involves connecting numerous devices to the internet, enabling them to communicate and share data. These devices can range from everyday objects like smart thermostats and wearables to critical systems in industries like healthcare, manufacturing, and transportation.


Note: Due to the in-person nature of this training, there is a minimum number of participants required for each training cohort. Contact us for more details.

Course Information

Why Take This Course?

Course Details

Course Outline

About Your Instructor

Investment

$3,997 CAD per person

Course Dates and Times:

Inquire for more details

Cybersecurity knowledge is crucial to fulfill fiduciary duties and make informed strategic decisions in an increasingly complex world.

Malicious attacks are escalating at an unprecedented rate - both in terms of severity and sophistication. Organizations understand the massive threat that ransomware, data-breaches and hacking pose to their business and their customers. Corporate espionage, data exfiltration and intellectual property theft are at an all-time high, leading to catastrophic economic and reputational damage for victims.

The global cybersecurity market is projected to surpass $500B U.S. dollars by 2030 (Bloomberg). Understanding the nature of cybersecurity risk is essential to managing business risk. It’s imperative that board members have a nuanced understanding of cybersecurity to ensure the necessary measures are in place to protect sensitive data, maintain compliance, and mitigate cyber risks.

 

Why Take This Course?


Securing the IoT involves implementing measures such as encryption, authentication protocols, regular updates, and robust access controls. It's an ongoing challenge due to the vast number and diversity of devices, often with varying levels of security features.

Ultimately, safeguarding connectivity in a connected world isn't just about protecting individual devices; it's about ensuring the integrity, privacy, and safety of the entire ecosystem, which relies on these interconnected devices to function efficiently and securely.
  • Privacy Concerns: IoT devices often collect personal data. If these devices are not adequately secured, there's a risk of this data being compromised, leading to privacy breaches.

  • Cybersecurity Threats: Unsecured IoT devices can be vulnerable to cyber attacks. Hackers might exploit these vulnerabilities to gain unauthorized access, disrupt services, or launch large-scale attacks.

  • Safety Risks: In critical systems like healthcare or transportation, compromised IoT devices could potentially risk human safety. For instance, a hacked medical device might deliver incorrect dosages, endangering patients.

  • Network Integrity: In a connected environment, the security of one device can impact the security of the entire network. Compromised IoT devices might serve as entry points for attackers to infiltrate the broader network.

  • Economic Impact: Breaches or disruptions due to insecure IoT devices can result in financial losses for businesses and individuals, affecting trust and confidence in these technologies.
“Lawsuit Filed Against Penn State for Cybersecurity Claims: A lawsuit filed against Penn State University alleges, that the university misrepresented its adherence to required cybersecurity protocols.”
(2023) Source: CVG Strategy

“Colonial Pipeline Co. and its owners acted negligently by employing lax cybersecurity standards that left the company vulnerable to a massive ransomware attack, a proposed Georgia federal court class action alleges.”
(2021) Source: Bloomberg Law

“The Suncor attack likely to cost company millions of dollars.” 
(2023) Source: Financial Post

“Solar Winds executives receive Wells Notice from U.S. SEC.”
(2023) Source: Reuters

“The global average cost to companies of a data breach hit an all-time high in 2022 of US$4.35 million, a 13 per cent increase from 2020. In the United States, the average cost to companies of a data breach in 2022 was US$9.44 million.”
(2022) Source: IBM
 

Course Details

AUDIENCE

This course is designed for professionals involved in IoT security or those seeking to enhance their knowledge in this rapidly evolving field. It is suitable for:

  • Cybersecurity Professionals

  • IT Professionals

  • IoT Developers

  • System Architects

  • Technology Enthusiasts


OVERVIEW

The primary goal of the “Foundations of IoT Security” webinar series is to comprehensively cover essential aspects of securing the Internet of Things (IoT) and to equip participants with the knowledge and skills necessary to safeguard connectivity in our increasingly connected world.

BENEFITS & LEARNING OUTCOMES

By the end of this course, participants will:

  • Gain a deep understanding of IoT security risks and vulnerabilities.

  • Acquire foundational knowledge of IoT security protocols and best practices.

  • Learn to secure the entire lifecycle of IoT devices.

  • Implement effective IoT authentication and access control measures.

  • Develop strategies fo securing IoT networks and gateways.

  • Understand the importance of IoT data privacy and integrity.

  • Master threat detection and incident response IoT environments.

  • Explore future trends and innovations in IoT security.
 

Course Outline

This is an 8-part webinar series. Each week focusing on a specific aspect of IoT security.

    • Introduction to IoT and its significance

    • Exploring vulnerabilities and risks associated with IoT devices

    • Case studies highlighting security breaches in IoT

    • Overview of standard IoT security protocols (MQTT, CoAP, TLS/SSL, etc.)

    • Encryption methods for securing data in transit and at rest

    • Best practices for implementing secure communication protocols

    • Overview of the IoT device lifecycle (manufacturing, deployment, operation, and disposal)

    • Security considerations and practices at each stage of the IoT device lifecycle

    • Regulatory compliance and standards in IoT device security

    • Importance of robust authentication mechanisms in IoT

    • Role-based access control (RBAC) and identity management in IoT ecosystems

    • Implementing strong authentication and authorization measures

    • Securing IoT networks and gateways against cyber threats

    • Best practices for securing IoT infrastructure (firewalls, intrusion detection systems, etc.)

    • Network segmentation and isolation strategies for enhanced security

    • Protecting data privacy in IoT environments

    • Ensuring data integrity and confidentiality in IoT applications

    • Compliance with privacy regulations (GDPR, CCPA, etc.) in IoT data handling

    • Methods for detecting IoT security threats and anomalies

    • Creating effective incident response plans for IoT security breaches

    • Case studies and real-world examples of successful threat detection and response

    • Exploring emerging technologies and trends in IoT security

    • Predictions and future challenges in securing the evolving IoT landscape

    • Q&A session and panel discussion with industry experts

 

About Your Instructor

Cara Wolf

Cara Wolf is a recognized thought leader and C-suite entrepreneur with 25+ years of experience growing technology companies profitably. She has over 10 years of information security experience spanning multiple industries and is an award winning, published author and speaker. She serves on the cybersecurity committees or at the Advisory Board and Director level for many organizations including the Board of Governors UCalgary, Council of Innovation and Entrepreneurial Leadership UCalgary, Automotive Parts Manufacturing Association, NGen and vCISO Catalyst.


 

Who We Have Worked With