WEBINAR

The State of IoT Security: Challenges, Compliance, and What Comes Next​

May 21, 2025
1:00 PM (EDT)

The risks around IoT device security are growing—but so are the expectations. Join experts from Mesh Systems and DigiCert as they break down what it really takes to design, deploy, and maintain secure connected products in a shifting regulatory landscape. You’ll learn:

  • Common myths about IoT security that lead to costly vulnerabilities and compliance risks 
  • Why having trusted PKI experts in your corner makes all the difference 
  • How real-world product constraints impact device security (and what to do about it) 
  • What new regulations like the U.S. Cyber Trust Mark and EU Cyber Resilience Act mean for your team 

In Partnership With: 

Watch Now On-Demand

By registering, you agree to receive communications from Mesh Systems and DigiCert related to this event and other relevant updates.

Test Caption
PANELISTS

Trusted Voices in Connected Security

Tim McAllister

Tim McAllister is Senior Director of Digital Trust at DigiCert, where he leads global initiatives in IoT and PKI-based cybersecurity. With over two decades of experience in securing connected systems across sectors—from aerospace to automotive—Tim has helped shape industry-wide trust frameworks and compliance strategies. A frequent speaker and trusted advisor to OEMs and system integrators, he specializes in enabling secure-by-design architectures that scale with evolving regulatory demands.

Nickolas Scaturro

Nickolas Scaturro is an Associate Technical Principal at Mesh Systems, where he leads the architecture, design, and delivery of secure, cloud-connected products for clients ranging from powerhouse private companies to fortune 500 enterprises. With experience spanning full-stack development, DevOps, and complex IoT systems, he helps clients bring connected solutions to market that are scalable, secure, and built to last. Nick works closely with product and engineering teams to turn business goals into actionable technical strategies.

"Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo."

Name

Name

Employee Position

CONTENT SECTION

Title Goes Here

Subtitle

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Subtitle

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

BOTTOM LINE

Key Takeaways

Below are the top takeaways from our webinar, “The State of IoT Security: Challenges, Compliance, and What Comes Next”. Register for an on-demand replay above for details on each.

PKI Gets Harder as You Scale

What works for a pilot or small deployment often breaks when rolled out across thousands of devices. Managing certificate provisioning, renewal, and revocation at scale requires architectural planning and automated lifecycle infrastructure from the start.

Compliance Isn’t Just Coming: It’s Already Here

With the Cyber Trust Mark and EU Cyber Resilience Act gaining traction, secure-by-design is no longer optional. Teams need to align now on OTA, software bill of materials (SBOM), and secure lifecycle practices to avoid disruption later.

Hardware Constraints Can’t Be an Excuse

Low-power or legacy hardware shouldn’t prevent secure deployment. From chip selection to secure gateways and server-side keygen, there are proven strategies to implement device identity and cryptography — even when resources are limited.

EXPLORE MORE

Want to see secure, scalable IoT in action? Explore how we help OEMs bring connected products to market—built on trust, compliance, and real-world results.