Presenter Photo

  • Understand high level IoT architectures and which one(s) apply to your environment
  • Identify all of the key types of credentials in your IoT system
  • Understand the common mistakes that IoT system administrators make with managing the credentials
  • Learn the methods to mitigating risk with IoT system credentials, including how Privileged Access Management can help secure your IoT system.