Sonu Shankar reveals data-driven insights: 30% of xIoT assets are unknown, 70% run weak credentials, and 30% are end-of-life. He covers why passive discovery fails and how credential gaps compound risks.
Across critical infrastructure, healthcare and manufacturing, extended Internet of Things devices - from HVAC controllers and IP cameras to medical equipment - represent the largest and least-managed segment of most connected environments. The risk they carry rarely stems from sophisticated attacks. It stems from unresolved basics.
Drawing on real-world deployment data, this session puts hard numbers to the problem: roughly 30% of xIoT assets are unknown to the organizations that own them, approximately 70% run default or weak credentials, and nearly 30% are end-of-life devices for which no patch will ever arrive.
In this data-driven session, you will learn:
- Why passive discovery alone cannot deliver the inventory depth needed for sound segmentation and risk decisions;
- How credential, firmware and configuration hygiene gaps compound each other;
- What a fundamentals-first approach to xIoT risk reduction looks like in practice.
Here is the course outline:
Measured Reality: What Real-World Data Reveals About xIoT Security Fundamentals |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
