Discover Security Events in Iot Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
IoT Security has become a critical concern as the number of connected devices approaches 30 billion globally by 2025, creating an unprecedented attack surface spanning consumer electronics, industrial systems, healthcare devices, and critical infrastructure. These devices often lack basic security controls, making them attractive targets for cybercriminals and nation-state actors.
IoT devices face multiple vulnerabilities including weak default credentials, lack of encryption, insecure firmware updates, and inadequate access controls. The convergence of IT, operational technology (OT), and IoT creates complex security challenges as organizations struggle to gain visibility and control over diverse device ecosystems (msspalert.com). Botnets like Mirai have demonstrated how compromised IoT devices can be weaponized for massive distributed denial-of-service attacks, while sophisticated adversaries target industrial IoT systems to disrupt manufacturing, energy, and transportation infrastructure.
Organizations face significant challenges securing IoT deployments including device inventory management, vulnerability patching for resource-constrained devices, network segmentation, and monitoring billions of endpoints. Many IoT devices cannot support traditional security agents, requiring alternative protection strategies. Managed security service providers are developing specialized capabilities to help organizations secure IoT environments as these systems become integral to business operations (iflockconsulting.com).
The industry is developing IoT-specific security standards, certification programs, and regulatory requirements. Manufacturers are implementing secure-by-design principles, hardware root of trust, and secure boot mechanisms. Organizations are adopting zero-trust network architectures, micro-segmentation, and IoT security platforms that provide discovery, risk assessment, and anomaly detection capabilities tailored to connected device environments.
All security events are automatically streamed into this table on a daily basis.
13th January 2026 | A Decade After the First Cyber Attack on Civilian Power Infrastructure: Lessons, Evolution, and Imperatives
This webinar revisits the landmark 2015 cyber attack on Ukraine’s power grid and examines how that event reshaped global understanding of cyber risk to critical infrastructure. Drawing on their direct involvement in the investigations, Robert M. Lee of Dragos and Tim Conway of the SANS Institute walk through what happened in the 2015 and 2016 incidents and why those attacks became defining moments for the OT security community. The session explains the broader impact on electric utilities and industrial organizations around the world.
The discussion highlights how the threat landscape has evolved over the past decade and outlines the most important lessons for securing operational environments today. Attendees will gain technical insight into attacker behavior, the weaknesses exposed during the Ukraine incidents and the defensive imperatives that have emerged since. The webinar concludes with an open Q and A for participants seeking deeper perspective on protecting critical infrastructure.
Company_Webinar • Part of Dragos
18th December 2025 | 2025 in Review: Asimily Product Innovation and Industry Trends
This webinar looks at how cyber asset and attack surface management evolved throughout 2025 and what these shifts mean for organizations preparing their security programs for the coming year. Asimily’s CEO shares key industry trends, regulatory developments and changing priorities that have influenced how teams manage risk across complex, distributed environments. The session explains how the focus is moving beyond simple asset visibility toward deeper risk reduction and stronger operational resilience.
Attendees will see how Asimily has expanded its platform to address new challenges, support emerging requirements and protect the full cyber asset attack surface. The discussion also highlights the major innovations that shaped 2025, the pressures driving updated security strategies and the practical steps organizations can take to strengthen compliance and readiness for 2026.
Company_Webinar • Part of Asimily
23rd April 2025 | Connected, Compliant, and Secure: Practical Third-Party Risk Management for Medical IoT
The event "Connected, Compliant, and Secure: Practical Third-Party Risk Management for Medical IoT" provided valuable insights into managing third-party risks in medical IoT environments. Attendees appreciated the expert speakers who shared practical strategies for ensuring compliance and security. The sessions were well-structured, offering actionable advice on integrating IoT devices while maintaining data protection. Networking opportunities allowed participants to connect with industry peers, enhancing the overall experience and fostering collaboration in the field.
Online • Part of Cylera
23rd April 2025 | Connected, Compliant, and Secure: Practical Third-Party Risk Management for Medical IoT
The event "Connected, Compliant, and Secure: Practical Third-Party Risk Management for Medical IoT" provided valuable insights into managing third-party risks in medical IoT environments. Attendees appreciated the expert speakers who shared practical strategies for ensuring compliance and security. The sessions were well-structured, offering actionable advice on mitigating vulnerabilities. Networking opportunities allowed participants to connect with industry peers, fostering collaboration. Overall, the event was highly informative and beneficial for professionals in the medical IoT sector.
Online • Part of Cylera
22nd April 2025 | The Future of CPS Protection: A Gartner® Magic Quadrant™ Leader Perspective
The Future of CPS Protection: A Gartner® Magic Quadrant™ Leader Perspective offers insightful discussions on the evolving landscape of cybersecurity for cyber-physical systems. Industry leaders share their expertise on emerging threats and innovative protection strategies. Attendees gain valuable knowledge on integrating advanced technologies to safeguard critical infrastructure. The event is well-organized, providing a platform for networking and collaboration among professionals. Overall, it is a must-attend for those focused on CPS security advancements.
Online • Part of Claroty