25.04.2024
Webinar Recording
English

A practical approach to secure connected devices: Be prepared for the cybersecurity norms coming your way

Videos you may also like

Secure connection from the field to the cloud always creates a major challenge in any modern IIoT solution. In the wake of new upcoming legislations with respect to data security and privacy, this challenge becomes more pressing. 

The European Commission (EC) has announced the adoption of a Delegated Act to the Radio Equipment Directive (RED), which establishes different cybersecurity requirements that manufacturers, importers and distributors must meet to market their wireless devices and products in the European Union. This act, referred to in the Article 3(3) of the RED aims to ensure a higher level of cybersecurity in such devices, and to strengthen consumers' confidence in them. It takes effect Feb. 1, 2022, and becomes mandatory Aug. 1, 2025, giving device manufacturers a 42-month transition period.

In this presentation, a practical approach to the development of IIoT security will be presented.  The complexity of norms and regulations will be broken down to simple requirements in hardware, software and cloud. Going by the “Security-by-design” approach, solutions will be presented to overcome the same. Finally, a unique solution to secure IoT connectivity will be presented which with a zero-touch approach not only ensures secure provisioning of devices in the field but also the entire device lifecycle management at scale.

Presentation: A practical approach to secure connected devices

Share on: