Endpoint Security , Events , Governance & Risk Management

Countering IoT Threats to Smart Buildings

Virtually Informed’s Sarb Sembhi Explains the Work of the IOT Security Foundation
Sarb Sembhi, chief technology officer, Virtually Informed

Modern construction techniques are employing a wide range of smart devices to control the environment, facilitate communications and save money. Sarb Sembhi, chief technology officer and chief information security officer at Virtually Informed and an officer of the IoT Security Foundation, shared a new report on IoT security for smart buildings with advice on complying with current and upcoming regulations.

See Also: SASE: Recognizing the Challenges of Securing a Hybrid Workforce

According to the Smart Built Environment Group’s advice for facilities management in smart buildings, organizations should look for lifecycle of solutions – from commissioning and designing all the way to decommissioning, with a plan for all of the functions and processes required.

In this video interview with Information Security Media Group at Infosecurity Europe 2023, Sembhi discussed:

  • Regulatory trends affecting IoT deployments;
  • Guidance and best practice for IoT;
  • The impact of cybersecurity jobs on mental health;

Sembhi, who leads technology and security at Virtually Informed, also serves as co-vice chair of the smart buildings working group at the IoT Security Foundation. He is a highly respected speaker and activist within the cybersecurity community, promoting best practice through thought leadership.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.