As IoT products and services become increasingly sophisticated and granular, access points for cybersecurity breaches multiply. Edge and perimeter systems are particularly vulnerable, as mobile security is still underdeveloped. This session will look at the policy standards recommended by the U.S. government through NIST and foreign governments; carrier protection policies and related liabilities; and U.S. and international enterprise best practices for securing cloud infrastructure.