Webinar Series: Tips & Tricks for Securing IoT with Juniper Networks - Part 1 Visibility and Part 2 Attack Prevention
Part 1 – Visibility
Expert series with Srinivas Akella from WootCloud and Laurence Pitt from Juniper Networks
Sprawling IoT devices are prime targets for attackers. Once compromised, infected IoT devices connected to the network can quickly bring that network down or act as an entry point to more valuable targets.
The first step to securing IoT is identifying those devices and infrastructure connected to your network.
Join experts from Juniper Networks and WootCloud to learn tips and tricks for identifying and securing IoT:
- ID different types of headless devices in the work-from-anywhere era
- Use contextual information to understand risk to the network
- Profile IoT behavior to inform access and security policies
Part 2 – Prevention:
Panel discussion with WootCloud and security expert Jennifer Minella
Sprawling IoT devices are prime targets for attackers. Once compromised, infected IoT devices connected to the network can quickly bring that network down or act as an entry point to more valuable targets.
Once you know what IoT devices are on your network, you need robust policies that allow the right level of connectivity, while securing IoT access to network resources and reducing risk.
Join WootCloud CTO and Founder Srinivas Akella, Security Expert Jennifer Minella, and Laurence Pitt from Juniper to learn how to:
- Understand the IoT attack surface
- Use behavior as an indicator of compromise
- Build strong segmentation and inspection policies
Speakers:

Founder and Chief Technology Officer
WootCloud

Viszen Security

Laurence Pitt
Technical Security Lead