-
Image
-
Publish in core platform
No
-
URL
https://linkopingsciencepark.se/hur-sakerstaller-vi-cybersakerheten-i-iot-produkter/
-
Link Type
Background information url
-
Target audience
Digital technology / specialisation
CybersecurityDigital skill level
BasicGeographic Scope - Country
SwedenIndustry - Field of Education and Training
Target language
Type of initiative
Local initiative
Event setting
Skip to content
On August 16, IoT World and Cyberly arranged a network meeting focusing on cyber-secure IoT products, where member companies ROSSAKER, Link22 and SICK IVP shared their insights and working methods on security in IoT development.
The event, which attracted around 20 participants to Dospace Alfa, was initiated by Stefan Karlsson, CEO of ROSSAKER. He shared the company’s security strategies, where he stressed the importance of avoiding erroneous patterns that could compromise security, especially when it comes to updating systems and SD cards.
“Updates are key to maintaining the security of an IoT product. In some cases, it may be necessary to refrain from cloud servers in order to be able to turn off system parts in the event of an intrusion,” Stefan Karlsson pointed out.
After an interactive discussion, Conny Ljungqvist, CEO of Link22, took over and discussed how their security solutions meet the high demands of their customers. He stressed the importance of segmentation and reducing exposure to risk by building own firewalls and using technologies such as TLS and VPN.
“When working with our customers, we often create separate firewalls and use private networks to protect the devices. Data diodes are also an important part of being able to make secure installations where networks are missing,” explained Conny Ljungqvist.
Finally, Fredrik Claesson, systems architect and cybersecurity specialist at SICK IVP, shared his experiences of challenges with legacy vulnerabilities and the importance of a secure development process throughout the entire chain, including managing component suppliers.
“We need to ensure that our development process is safe throughout the chain, including back in time. In addition, we need a robust security process for the components we use,” said Fredrik Claesson.
This autumn’s first network meeting within IoT World and Cyberly gave participants new perspectives and valuable contacts. Are you interested in becoming a member of Cyberly or IoT World? Read more via the links below:
• Become a member of IoT World
Image rights: Unsplash ©




