IoT Security Podcast

Steve Lodin, a veteran of the cybersecurity industry, embarks on an ambitious mission to protect millions of identities from hackers while his team strives to maintain high-security standards and compliance with regulators.

Lodin's experience comes with a background in software engineering, system administration, and global IT security. He has worked with General Motors, Ernst and Young, Roche Diagnostics, and Sallie Mae, and has a Master's degree in Computer Science from Purdue University.

Show Notes

Steve Lodin, a veteran of the cybersecurity industry, embarks on an ambitious mission to protect millions of identities from hackers while his team strives to maintain high-security standards and compliance with regulators.

"The more that we can identify, document, and share, the less attacks that are hitting our colleagues and our peers in the industry." - Steve Lodin

Lodin's experience comes with a background in software engineering, system administration, and global IT security. He has worked with General Motors, Ernst and Young, Roche Diagnostics, and Sallie Mae, and has a Master's degree in Computer Science from Purdue University.

Steve Lodin had been working with electronics engineering and software engineering since he got his engineering degree. He had a passion for computers and decided to focus on security. He went back to school for a Master's in Computer Science and went on to work at Ernst and Young, Roche Diagnostics, and the world of startups. For the past 10 years, he has been working at Sallie Mae protecting millions of IDs from hackers. With the shift to the cloud, Steve has been advocating for the removal of legacy security debt and providing security opportunities to improve the environment. He is a prominent contributor to the industry, helping to identify and document attacks to protect against them.

In this episode, you will learn the following:
1. What challenges arise when attempting to secure xIoT devices?
2. How can organizations prevent external and internal attack surfaces?
3. How can organizations use the cloud to reduce their legacy security debt?


Let’s get into Things on the IoT Security Podcast!

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos
And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

What is IoT Security Podcast?

The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join Brian Contos and John Vecchi twice a month as they speak with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought leaders, to give you the information you need to navigate security and threats in an increasingly Thing-based world.

Join us on the IoT Security Podcast, powered by Phosphorus Cybersecurity.
https://phosphorus.io/