WEBINAR
The State of IoT Security: Challenges, Compliance, and What Comes Next
May 21, 2025
1:00 PM (EDT)
The risks around IoT device security are growing—but so are the expectations. Join experts from Mesh Systems and DigiCert as they break down what it really takes to design, deploy, and maintain secure connected products in a shifting regulatory landscape. You’ll learn:
- Common myths about IoT security that lead to costly vulnerabilities and compliance risks
- Why having trusted PKI experts in your corner makes all the difference
- How real-world product constraints impact device security (and what to do about it)
- What new regulations like the U.S. Cyber Trust Mark and EU Cyber Resilience Act mean for your team
In Partnership With:

Watch Now On-Demand
By registering, you agree to receive communications from Mesh Systems and DigiCert related to this event and other relevant updates.



PANELISTS
Trusted Voices in Connected Security
Tim McAllister
Tim McAllister is Senior Director of Digital Trust at DigiCert, where he leads global initiatives in IoT and PKI-based cybersecurity. With over two decades of experience in securing connected systems across sectors—from aerospace to automotive—Tim has helped shape industry-wide trust frameworks and compliance strategies. A frequent speaker and trusted advisor to OEMs and system integrators, he specializes in enabling secure-by-design architectures that scale with evolving regulatory demands.
Nickolas Scaturro
Nickolas Scaturro is an Associate Technical Principal at Mesh Systems, where he leads the architecture, design, and delivery of secure, cloud-connected products for clients ranging from powerhouse private companies to fortune 500 enterprises. With experience spanning full-stack development, DevOps, and complex IoT systems, he helps clients bring connected solutions to market that are scalable, secure, and built to last. Nick works closely with product and engineering teams to turn business goals into actionable technical strategies.

"Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo."

Name
Employee Position

CONTENT SECTION
Title Goes Here
Subtitle
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Subtitle
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
BOTTOM LINE
Key Takeaways
Below are the top takeaways from our webinar, “The State of IoT Security: Challenges, Compliance, and What Comes Next”. Register for an on-demand replay above for details on each.
PKI Gets Harder as You Scale
What works for a pilot or small deployment often breaks when rolled out across thousands of devices. Managing certificate provisioning, renewal, and revocation at scale requires architectural planning and automated lifecycle infrastructure from the start.
Compliance Isn’t Just Coming: It’s Already Here
With the Cyber Trust Mark and EU Cyber Resilience Act gaining traction, secure-by-design is no longer optional. Teams need to align now on OTA, software bill of materials (SBOM), and secure lifecycle practices to avoid disruption later.
Hardware Constraints Can’t Be an Excuse
Low-power or legacy hardware shouldn’t prevent secure deployment. From chip selection to secure gateways and server-side keygen, there are proven strategies to implement device identity and cryptography — even when resources are limited.