_The Future of IoT Security (1200 x 300 px)

The Future of IoT Security: A Modern Approach to Scanning with Source Code, Binary, and Third-Party Analysis

Traditional vulnerability scanners weren’t built for IoT. They analyze package manifests and application-layer software, but they completely miss compiled binaries, embedded firmware, and hidden third-party components—leaving your devices exposed to undetected vulnerabilities, supply chain risks, and regulatory non-compliance.

As cyber threats evolve and compliance requirements like the Cyber Resilience Act (CRA) demand deeper visibility, IoT security teams need to go beyond standard scanning. In this webinar, we’ll cover:

  • Why scanning source code isn’t enough—critical risks lurk in compiled binaries
  • How third-party and open-source components create hidden security gaps
  • Where traditional scanning tools fail—and what they’re not telling you
  • How firmware and binary analysis uncover vulnerabilities before attackers do

Join us for a webinar that digs deeper into source code, binaries, and third-party components to reveal risks standard scanners simply miss.

About our Speaker:

Larry Pesce is VP of Services at Finite State, where he leads product security research and vulnerability assessment initiatives. With over 20 years of experience in penetration testing and security research, Larry specializes in vulnerability management for Healthcare, ICS/OT, and IoT/IIoT embedded devices. He is a principal instructor and course author at the SANS Institute, where he develops and delivers advanced training on vulnerability assessment and management. Larry holds several GIAC certifications, including the Global Industrial Cyber Security Professional (GICSP), GIAC Certified Incident Handler (GCIH), and GIAC Assessing and Auditing Wireless Networks (GAWN). As co-host of Paul's Security Weekly podcast for over two decades, he has been a prominent voice in vulnerability research and security awareness. Larry earned his B.S. in Computer Information Systems from Roger Williams University and continues to contribute to the advancement of product security and vulnerability management practices.

Register