On-Demand Webinar: The Real Cost of Device Insecurity

Skip to content

Today, even in scenarios where security is being prioritized, a gap remains between the perceptions of IoT security implementation and the reality. On November 10th, 2021, influential voices from across the IoT ecosystem came together to break down the true cost of insecurity, the benefits of taking a proactive approach to security, and how the industry can create new business models, efficiencies, and gain protection from third parties. By watching this webinar, you will:

Meet the Panellists

DCMS logo- department for digital, culture, media and sport

Veena Dholiwar, Cyber Security Expert, DCMS

Veena works in the Secure by Design team in DCMS, focussing on the cyber security of consumer connectable devices. Veena and her team will introduce legislation to mandate that consumer connectable devices meet a minimum level of cyber security requirements, which should be built into them at the design stage. Her work focuses on the enforcement of the legislation.

Forescout logo

Elisa Costante, VP of Research, Forescout Technologies

Elisa is an experienced Vice President of Research with a demonstrated history of working in the computer and network security industry. She holds a PhD in Cyber Security. As head of Forescout Research Labs, she drives the execution of cyber-security research aiming at understanding the evolution of the threat landscape and at identifying mitigation techniques.

Munich RE logo

Tim Davy, Cyber Security Specialist, MunichRe

Tim’s main responsibility is to co-create Cyber Insurance–based products and build a comprehensive portfolio of cybersecurity capabilities to support both insurance clients and direct-end insureds. Prior to this, Tim spent 17 years with British Telecom working in the security domain. More recent he was Head of the British Telecom Cyber Assessment Lab. He has experience in systems and security architecture where he has built large and complex defence and analysis platforms as well as security operational roles running network forensics as well as penetration testing and occasional reserving malware exercises.

Arm logo

David Maidment, Senior Director, Secure Device Ecosystem, Arm (A PSA Certified Co-founder)

Based in Cambridge UK, David brings over 25 years of experience in the embedded and IoT industry. He specializes in the intersection between device security and business assurance to drive best practice security adoption across the electronics industry. In his role at Arm, David leads device security ecosystem activities including the widely adopted PSA Certified initiative.

UCL logo

Madeline Carr, Professor of Global Politics and Cybersecurity at UCL

Madeline Carr is Professor of Global Politics and Cybersecurity at University College London. Professor Carr is also the Director of the UK-wide RISCS Institute which looks at the human and organizational factors of cybersecurity. Professor Carr has published on cyber norms, multi-stakeholder Internet governance, the future of the insurance sector in the IoT, cybersecurity and international law, and the public/private partnership in national cyber security strategies. She is the lead on the International Strategy of the new PETRAS National Centre of Excellence in Cybersecurity of the IoT. Professor Carr is also a member of the World Economic Forum Global Council on the Connected World.

Sally Eaves, Emergent Technology CTO, Global Strategy Advisor

Sally Eaves is a chief technology officer, practising professor of fintech and global strategic advisor consulting on the application of disruptive technologies. She is the senior policy advisor for Global Foundation for Cyber Studies and Research, a non-profit think tank focusing on technology issues and cyber policy. Globally recognised as a thought leader in the field she has won multiple awards, is an international keynote speaker and an accomplished author. Sally specialises in the incorporation and application of emergent technologies such as blockchain and AI to business and society.

Five Top Tips to Reduce IoT Security Costs

Gain access to a new advisory paper outlining some actions that every company can take to reduce IoT security costs.

Download Now