Micro Webinar Series: Cybersecurity Policy and Implementation for the Intelligent Edge

Micro Webinar Series: Cybersecurity Policy and Implementation for the Intelligent Edge

security challenges

74% of business executives report that their IoT risk management programs are failing to keep pace with the risks posed by the ubiquitous use of IoT devices both internally and externally. [1] At the same time, the number of installed IoT devices is expected to double from 31 billion currently to 75 billion in 2025. [2]

Oct 5, 2020

The task of creating a policy and ensuring security can seem daunting, especially when it comes to designing cybersecurity into devices and systems at the edge. What does the journey look like? What are the best practices for implementing a security policy? Where do you begin?

Learn what you need to know to secure your embedded security system in this fast-paced micro video series with Arlen Baker, Wind River Principal Security Architect. Each day, over the course of a week, we’ll send you a video in the series.

Fill in the form on the right to Watch Now.

[1] https://sharedassessments.org/blog/a-new-roadmap-for-third-party-iot-risk-management/


[2] https://securitytoday.com/Articles/2020/01/13/The-IoT-Rundown-for-2020.aspx?Page=2

Recommended for you...

Navigating the Data Immediacy Readiness Scale
How Smart Technologies Are Reshaping the Sporting Goods Industry
Architectural Elements of a Real-Time Visual Intelligence System
Multimodal AI in Trading is a Competitive Differentiator

Featured Resources from Cloud Data Insights

AI-Powered Network-as-a-Service: Enabling “Lights Out” Networking for the AI Era
Jim Sullivan
Apr 2, 2026
The Industry is Designing AI for Machines, Not for Humans. That is Not a Mistake.
Onur Alp Soner
Apr 1, 2026
Why Unstructured Data Will Decide Whether AI Delivers Real Value in 2026
Nick Burling
Mar 31, 2026
AI Grows Up: Enterprise Priorities Beyond Experimentation
Chris Bonavita
Mar 30, 2026
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.