IoT For All
IoT For All
In this episode of the IoT For All Podcast, Paul Savill, Global Practice Leader for Network and Edge Computing at Kyndryl, joins Ryan Chacon to discuss taking IoT security seriously. The conversation also covers the IT/OT divide, the challenges of IoT adoption, the security vulnerabilities of legacy infrastructure, the importance of strict security policies and training, the impact of new regulations, when it makes sense to have an in-house security team, strategies for businesses to enhance their security posture, and advice for companies on staying up-to-date with the latest cybersecurity threats.
Qoitech empowers engineering teams to build energy-efficient IoT and embedded devices. They provide state-of-the-art solutions for power consumption measurements and analysis, and battery life prediction. Power profile your hardware and software, and test and pick the right battery or energy harvesting for your application - at your bench or in an automated setting - all with the one comprehensive, flexible and scalable Otii Product Suite.
Join the leading players in the electronics industry in delivering long-lasting innovation with Qoitech.
Paul Savill is the Global Practice Leader for Network and Edge Computing at Kyndryl. He came to Kyndryl from Lumen Technologies, where he was Senior Vice President of Product Management and Services. He has deep expertise across a range of network and edge domains, including edge/cloud, cloud connectivity, SD-WAN, optical networking, content delivery services, and IT services.
Interested in connecting with Paul? Reach out on LinkedIn!
Kyndryl is the world's largest IT infrastructure services provider, serving thousands of enterprise customers in more than 60 countries. The company designs, builds, manages, and modernizes the complex, mission-critical information systems that the world depends on every day.
(00:44) Introduction to Paul Savill and Kyndryl
(03:44) Biggest challenges in IoT adoption
(07:02) How has the IT/OT divide created security threats?
(08:37) Security threats of outdated hardware
(10:39) How to secure your organization
(13:40) How to know how secure you are
(15:55) Staying up-to-date on security threats
(17:39) When should security be brought in-house?
(19:22) Learn more and follow up