Redirecting you to
Press Release Aug 27, 2019

Sectigo CTO of IoT Featured in ReadWrite Lab’s Masterclass, “Lessons from Past IoT Attacks and the Future of Device Security”

Sectigo’s Jason Soroko will discuss the evolving IoT security landscape during a live online ReadWrite Labs Masterclass Aug 29th @ noon EDT. “Hard Lessons from Past IoT Attacks & the Future of Device Security,” will ID patterns and commonalities from real-world attacks and detail successful IoT security architectures.

Roseland, N.J. – August 27, 2019Sectigo, the world’s largest commercial Certificate Authority (CA) and a provider of purpose-built and automated PKI management solutions, today announced that Sectigo’s CTO of IoT, Jason Soroko, will discuss the evolving IoT security landscape during a live online ReadWrite Labs Masterclass this week. The session, “Hard Lessons from Past IoT Attacks and the Future of Device Security,” will identify patterns and commonalities from real-world attacks and detail successful IoT security architectures.

WHEN:
Thursday, August 29, 2019 - 12:00 pm ET

WHERE:
Live online (register here)

WHAT:
Founded in 2013, ReadWrite Labs is an industry catalyst that accelerates the growth of the Business of Things by connecting the people, companies, and financing that are shaping the connected world. ReadWrite Lab’s content, research, and events provide insight and inspiration to the world's most innovative IoT companies, entrepreneurs, and investors.

WHO:

With more than two decades of expertise in digital security, authentication, and IoT applications, Jason Soroko oversees Sectigo’s innovative IoT security solutions, providing customers and partners across the IoT supply chain with expert insights about how enterprises can improve security for connected devices.

During the Masterclass, hosted by Phillipe Cases, CEO at Topio Networks, Jason will share hard lessons from the likes of Stuxnet and the Mirai botnet, along with well-publicized attacks and recalls on connected cars and medical devices. He will also discuss how legislation is changing the IoT landscape and detail the different IoT security architectures, highlighting the key factors that make them successful.