{"id":1025,"date":"2015-03-19T18:01:59","date_gmt":"2015-03-19T18:01:59","guid":{"rendered":"http:\/\/www.isbr.in\/blog\/?p=1025"},"modified":"2015-04-07T09:12:32","modified_gmt":"2015-04-07T09:12:32","slug":"guest-lecture-on-cybersecurity-and-internet-of-things","status":"publish","type":"post","link":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/","title":{"rendered":"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"CYBERSECURITY AND INTERNET OF THINGS\" src=\"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG\" alt=\"\" width=\"640\" height=\"360\" \/><\/p>\n<p>Mr. David Heyman, former Asst. Sec for policy at U.S. Department of Homeland Security, and retired software engineer and Andie De Arment, visited ISBR on the 19<sup>th<\/sup> of March 2015 for a \u201cSession on Cybersecurity and Internet of things\u201d the event was conducted in association with Indo &#8211; American Chamber of Commerce.<\/p>\n<p>During this session Mr.David Heyman discussed about the development of internet in which everyday objects have network connectivity, allowing them to send and receive data and about the extraordinary potential of the Internet of Things but as every invention has a negative aspect attached to it he told about the negative aspect of Internet of things.<\/p>\n<p>Everything that can be connected to the Internet can be hacked this is where cyber security plays a vital role. He also told about the barriers to their adoption, and how governments and businesses can navigate this new frontier, work together, and re-imagine and transform cities-and nations for tomorrow.<\/p>\n<p>It was an interactive session where we had guests from other organizations as well to make the session more interesting and inspiring.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mr. David Heyman, former Asst. Sec for policy at U.S. Department of Homeland Security, and retired software engineer and Andie<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-1025","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS - ISBR Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS - ISBR Blog\" \/>\n<meta property=\"og:description\" content=\"Mr. David Heyman, former Asst. Sec for policy at U.S. Department of Homeland Security, and retired software engineer and Andie\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/\" \/>\n<meta property=\"og:site_name\" content=\"ISBR Blog\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/ISBR.Business.School\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-19T18:01:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-04-07T09:12:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG\" \/>\n<meta name=\"author\" content=\"ISBR Newsletter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ISBRCollege\" \/>\n<meta name=\"twitter:site\" content=\"@ISBRCollege\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ISBR Newsletter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/\"},\"author\":{\"name\":\"ISBR Newsletter\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/#\/schema\/person\/995a0ef76f95a59ac0492b0d1ef9dc65\"},\"headline\":\"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS\",\"datePublished\":\"2015-03-19T18:01:59+00:00\",\"dateModified\":\"2015-04-07T09:12:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/\"},\"wordCount\":189,\"publisher\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/\",\"url\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/\",\"name\":\"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS - ISBR Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG\",\"datePublished\":\"2015-03-19T18:01:59+00:00\",\"dateModified\":\"2015-04-07T09:12:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#primaryimage\",\"url\":\"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG\",\"contentUrl\":\"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isbr.in\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/#website\",\"url\":\"https:\/\/www.isbr.in\/blogs\/\",\"name\":\"ISBR Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isbr.in\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/#organization\",\"name\":\"ISBR Blog\",\"url\":\"https:\/\/www.isbr.in\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.isbr.in\/blogs\/wp-content\/uploads\/2018\/11\/cropped-ISBR-logo-copy-2.png\",\"contentUrl\":\"https:\/\/www.isbr.in\/blogs\/wp-content\/uploads\/2018\/11\/cropped-ISBR-logo-copy-2.png\",\"width\":170,\"height\":140,\"caption\":\"ISBR Blog\"},\"image\":{\"@id\":\"https:\/\/www.isbr.in\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/ISBR.Business.School\",\"https:\/\/x.com\/ISBRCollege\",\"https:\/\/www.youtube.com\/channel\/UChK_f5ozjk5JbvFImLUoZgQ\",\"http:\/\/www.linkedin.com\/companies\/isbr-business-school\",\"https:\/\/www.instagram.com\/isbr_bangalore\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/#\/schema\/person\/995a0ef76f95a59ac0492b0d1ef9dc65\",\"name\":\"ISBR Newsletter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.isbr.in\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/74d4e08f31e1363f0b4c038f6013b6bfeaca617b33b6e06568d0d8cd4da10f1c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/74d4e08f31e1363f0b4c038f6013b6bfeaca617b33b6e06568d0d8cd4da10f1c?s=96&d=mm&r=g\",\"caption\":\"ISBR Newsletter\"},\"sameAs\":[\"http:\/\/www.isbr.in\"],\"url\":\"https:\/\/www.isbr.in\/blogs\/author\/newletter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS - ISBR Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/","og_locale":"en_US","og_type":"article","og_title":"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS - ISBR Blog","og_description":"Mr. David Heyman, former Asst. Sec for policy at U.S. Department of Homeland Security, and retired software engineer and Andie","og_url":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/","og_site_name":"ISBR Blog","article_publisher":"http:\/\/www.facebook.com\/ISBR.Business.School","article_published_time":"2015-03-19T18:01:59+00:00","article_modified_time":"2015-04-07T09:12:32+00:00","og_image":[{"url":"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG","type":"","width":"","height":""}],"author":"ISBR Newsletter","twitter_card":"summary_large_image","twitter_creator":"@ISBRCollege","twitter_site":"@ISBRCollege","twitter_misc":{"Written by":"ISBR Newsletter","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#article","isPartOf":{"@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/"},"author":{"name":"ISBR Newsletter","@id":"https:\/\/www.isbr.in\/blogs\/#\/schema\/person\/995a0ef76f95a59ac0492b0d1ef9dc65"},"headline":"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS","datePublished":"2015-03-19T18:01:59+00:00","dateModified":"2015-04-07T09:12:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/"},"wordCount":189,"publisher":{"@id":"https:\/\/www.isbr.in\/blogs\/#organization"},"image":{"@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/","url":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/","name":"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS - ISBR Blog","isPartOf":{"@id":"https:\/\/www.isbr.in\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#primaryimage"},"image":{"@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG","datePublished":"2015-03-19T18:01:59+00:00","dateModified":"2015-04-07T09:12:32+00:00","breadcrumb":{"@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#primaryimage","url":"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG","contentUrl":"https:\/\/lh6.googleusercontent.com\/-TDikwKeakuE\/VSOfJ4a72wI\/AAAAAAAABbU\/bKyuf9iiJTc\/s640\/CYBERSECURITY%2520AND%2520INTERNET%2520OF%2520THINGS.JPG"},{"@type":"BreadcrumbList","@id":"https:\/\/www.isbr.in\/blogs\/guest-lecture-on-cybersecurity-and-internet-of-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isbr.in\/blogs\/"},{"@type":"ListItem","position":2,"name":"GUEST LECTURE ON CYBERSECURITY AND INTERNET OF THINGS"}]},{"@type":"WebSite","@id":"https:\/\/www.isbr.in\/blogs\/#website","url":"https:\/\/www.isbr.in\/blogs\/","name":"ISBR Blog","description":"","publisher":{"@id":"https:\/\/www.isbr.in\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isbr.in\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.isbr.in\/blogs\/#organization","name":"ISBR Blog","url":"https:\/\/www.isbr.in\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.isbr.in\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.isbr.in\/blogs\/wp-content\/uploads\/2018\/11\/cropped-ISBR-logo-copy-2.png","contentUrl":"https:\/\/www.isbr.in\/blogs\/wp-content\/uploads\/2018\/11\/cropped-ISBR-logo-copy-2.png","width":170,"height":140,"caption":"ISBR Blog"},"image":{"@id":"https:\/\/www.isbr.in\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/ISBR.Business.School","https:\/\/x.com\/ISBRCollege","https:\/\/www.youtube.com\/channel\/UChK_f5ozjk5JbvFImLUoZgQ","http:\/\/www.linkedin.com\/companies\/isbr-business-school","https:\/\/www.instagram.com\/isbr_bangalore\/"]},{"@type":"Person","@id":"https:\/\/www.isbr.in\/blogs\/#\/schema\/person\/995a0ef76f95a59ac0492b0d1ef9dc65","name":"ISBR Newsletter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.isbr.in\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/74d4e08f31e1363f0b4c038f6013b6bfeaca617b33b6e06568d0d8cd4da10f1c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/74d4e08f31e1363f0b4c038f6013b6bfeaca617b33b6e06568d0d8cd4da10f1c?s=96&d=mm&r=g","caption":"ISBR Newsletter"},"sameAs":["http:\/\/www.isbr.in"],"url":"https:\/\/www.isbr.in\/blogs\/author\/newletter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/posts\/1025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/comments?post=1025"}],"version-history":[{"count":2,"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/posts\/1025\/revisions"}],"predecessor-version":[{"id":1027,"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/posts\/1025\/revisions\/1027"}],"wp:attachment":[{"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/media?parent=1025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/categories?post=1025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.isbr.in\/blogs\/wp-json\/wp\/v2\/tags?post=1025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}