Protecting the IoT: Threat Aware IoT Gateways

February 18, 2016
12:00 Noon EST (17:00 GMT)

Sponsored by: Webroot

As IoT-centric organizations look to take advantage of the integration of IT with OT, preventing cross-over by Internet-borne threats is increasingly important. To combat this issue, the development and use of IoT Gateways is becoming a preferred method to protect critical infrastructure. This webinar explores the growth and role of the IoT Gateways in the market, and also takes a look at what the integration of threat intelligence can do to augment their effectiveness.

Moderated by:

Robin Duke-Woolley, Founder & CEO, Beecham Research
Robin has over 35 years experience in the telecom/IT industry. Firstly in commercial roles covering Marketing Management, Sales Management and General Management in international technology vendor companies. Secondly in market analysis/consulting roles. He has been researching the M2M/IOT market for over a decade, since 2001, and is an internationally recognized thought leader in this area.


John Sirianni, Vice President of Strategic Partnerships, IoT, Webroot
John Sirianni is Vice President of Strategic Partnerships for IoT at Webroot, responsible for IoT Strategy and Ecosystem development. Mr. Sirianni has over 30 years of experience leading advanced technology innovation and strategic business development initiatives for global high-tech firms. His experience includes Aerospace and Industrial Control Systems, Real-time Embedded Systems, IT & Telecom Consulting, Big Data Platforms, M2M Systems, Automotive Infotainment Systems, RF Comms, Mobile Device Intelligence and Machine Learning Systems.

David Dufour, Head of Security Architecture, IoT, Webroot
Mr. Dufour is Head of Security Architecture for IoT at Webroot designing automated threat detection and remediation solutions with top tier software and hardware manufactures. His nearly thirty years of experience in software engineering has led to the creation of several predictive threat algorithms and the development of new techniques for mapping threat landscapes to identifying bad actors.