Key Methods to Prevent IoT and Cybersecurity Threats
Key Methods to Prevent IoT and Cybersecurity Threats

Duration: 1 hour
Available On Demand
Summary

​​Technological change and innovation is the only constant within today’s world. Both public and private sectors see enormous potential in integrated data collection, analysis, and communication software. The internet of things (IoT) provides the means to enable business activities through sensor data collection and analysis to bring insights to facilitate next-level decisions.  

​As you can imagine, with sensitive data exchange over the internet comes security issues. This webinar discusses the various types of IoT and cybersecurity threats.

Key Learning :

  • learn about security issues with IoT devices 
  • hear about several cybersecurity incidences that occurred recently 
  • how to prevent cybersecurity threats — including ring oscillator physical unclonable functions and process-specific functions 
Speakers
Brad Jolly
Brad Jolly
Senior Application Engineer
Keysight Technologies
Brad Jollyhas been with Keysight Technologies (previously Hewlett-Packard and Agilent Technologies) for more than 22 years, including roles in software R&D, UI design, learning products, application engineering, product support, training, product marketing, and product management. He currently works as an applications engineer focusing on IoT power consumption challenges. Brad received his B.S. in Mathematics from the University of Michigan.

By submitting your registration, you are providing Keysight with your personal data.

For information on how we use your personal data, and the choice you have, please review Keysight Privacy Statement link at the bottom of this page.

Learn more about our commitment to privacy:  Keysight Privacy Statement
©   Keysight Technologies