Do you ever get tired of the same old web events? It feels like every time I watch a webinar, I see at least one — if not several — of these hallmarks:
- Rambling discussions: overlong conversations that are difficult to follow
- Information overload: dense, messy slides that present too much information at once
- No sense of context: agendas and topics of discussion are seldom seen or referred to
- No sense of time: segment lengths are unknown — as well as topics coming up next
I don’t know about you, but that’s just not my style.
So, when I got the opportunity to chat with leading experts from Google, Yale and August US, and Afero about the Cyber Trust Mark and its role in securing the Internet of Things (IoT), I vowed to do something different.
First, let me give you some context. Consumer IoT devices are everywhere. They monitor appliances, households, and the people who use them. But all that connectivity comes at a cost. Cyberattacks are a persistent threat to user privacy, manufacturer liability, and consumer loyalty. That’s why the US Government is fighting back. The recently-announced Cyber Trust Mark program establishes crucial baselines for security, privacy, and transparency in connected devices.
Now, if you’re involved with the manufacture or testing of these devices, you probably have a few questions about the Cyber Trust Mark. What does it entail? How do devices get certified? What kinds of threats do I need to look out for? And how will this impact and shape the future of IoT?
If you’re looking to answer these questions, then you’ve come to the right place. In just 40 minutes on January 24 you’ll hear from experts at Google, Yale and August US, and Afero discuss the Cyber Trust Mark, securing the internet of things, and plenty more.
Why Should You Attend This Event?
Here’s four of the ways we’re working to make this event engaging, insightful, and compelling.
1. Onscreen agenda and timer
There’s nothing worse than tuning into a web event and feeling lost. That’s why we’re deploying a new onscreen agenda graphic with a timer, so you can see what we’re talking about and how long we’ll be discussing it. And, since the agenda updates in real time, you’ll always have an idea of where the discussion’s headed.
2. Smart, engaging panelists
Thought leadership isn’t asserted — it’s earned. Each of our panelists has earned every ounce of that designation.
- Tatyana Bolton | Security Policy Manager | Google
- Kevin Kraus | VP of Technology Alliances and IoT Business Development | Yale and August US
- Bret Jordan | Chief Security Strategist | Afero
- Scott Register | VP of Security Solutions | Keysight
Learn more about each panelist on the event registration page.
3. Short, sweet, and kinetic
A webinar is not the time nor place for aimless banter. That’s why we’re asking our panelists ~20 pointed questions — and we’re limiting response times to one to two minutes per person. Remember that timer I mentioned earlier? That’s exactly why we’re using it — so no one takes five minutes when two will do just fine.
4. Real time Q&A
No one wants to wait until the very end of the show to ask questions. It’s easy to lose your train of thought and forget what you wanted to ask. That’s why we’ll have experts monitoring the event chat in real time to answer your most pressing questions. And, in case you stump the people in chat, we’ll make sure to follow up with you after the event.
See You on January 24
Check out the event page to register. Even if you can’t make it for the live event, we’ll be sure to follow up with an on-demand recording so you don’t miss a thing.