5 Experts. 40 Minutes. 20+ Burning Questions.

The Cyber Trust Mark is redefining security and privacy for the Internet of Things (IoT). But what does it mean for manufacturers? Join us January 24 to find out.

Cyber Trust Mark: Can a New Standard Defuse a Decade of Risk?

IoT-related security risks threaten households, privacy, and consumer trust. But regulators are fighting back. The Cyber Trust Mark sets a new standard for device security.

But what does the program entail? How does certification work? What kinds of threats do manufacturers need to be aware of? And — most importantly — how will the Cyber Trust Mark impact the future of the Internet of Things?

In 40 minutes, you'll hear industry experts answer all these questions — and learn everything you need to know about securing connected devices.

Event Details

January 24, 2024

10 a.m. PST / 1 p.m. EST

Space is limited. Sign up now!

Meet The Panelists

Tatyana Bolton

Tatyana Bolton | Google

Tatyana Bolton is a Security Policy Manager at Google in the Security Center of Excellence where she helps drive global, enterprise-wide cybersecurity efforts in connected device security and cyber workforce efforts. She also leads Google’s Asia-Pacific cybersecurity policy, developing cybersecurity strategy and engagement on key policy priorities.

Kevin Kraus

Kevin Kraus | Yale and August US

Kevin is VP of Technology Alliances and IoT Business Development for Yale and August's Residential Electronic Lock business. An expert in defining key product technologies and developing partner integration strategies and tools to support seamless lock integration, Kevin also serves as Vice Chair of the Board for the Connectivity Standards Alliance.

Vijitha Chekuri

Bret Jordan | Afero

Afero's Chief Security Strategist, Bret is an experienced technical business executive with a passion for building amazing and secure products as well as the teams needed to produce them. Over the years, he's led initiatives to drive innovation, create new technologies, and design automated and collaborative cyberthreat intelligence and mitigation / remediation solutions.

Scott Register

Scott Register | Keysight

Scott leads Keysight’s Security Solutions Team. With experience spanning successful startups and global security companies, he has a proven record of developing innovative solutions combining leading-edge technology with remarkable usability. A self-professed "idea guy," Scott believes if you're not making work fun, you’re doing something wrong.

Mike Hodge

Mike Hodge | Keysight

Mike, your event host, is a self-professed geek and Solutions Lead for Keysight’s security portfolio. Fiercely opposed to pretentious jargon, he’s never met a story he wasn’t interested in telling, especially when it comes to complex topics like cybersecurity and technology. When he’s not working, you’ll probably find him somewhere in the mountains.

What is the Cyber Trust Mark?

The US Cyber Trust Mark labeling program establishes crucial standards around data privacy and cybersecurity for IoT devices. Building on pioneering work by the National Institute of Standards and Technology (NIST) and the Federal Communications Commission (FCC), the program aims to help consumers make more informed choices about the devices that monitor their households and health.

Key areas for device certification will include strong and unique default passwords, data security, secure update mechanisms, and incident detection pathways. In addition to passing a battery of security tests, the Cyber Trust Mark program will also require manufacturers to disclose the data their device collects and how it will be used.

Keysight wave graphic

This Won't Be Boring

Forget messy slides, rambling speakers, and sales pitches. Instead of lengthy monologues, you'll get short, timed responses to pointed questions. Wondering what we'll discuss next? There's a scrolling agenda onscreen. Can't wait for the Q&A? We'll have experts monitoring the chat to answer your questions in real-time.

Want help or have a question?