| Introduction to Memfault and the Hosts
| The Evolution of IoT Security
| Current State of IoT Security Practices
| Challenges with Outdated Software and Hardware
| The Importance of OTA Updates
| Real-World Implications of IoT Security
| Working with Third-Party Developers and Security Risks
| Security Considerations in Third-Party Collaborations
| Understanding Wireless Exploits and Vulnerabilities
| Emerging Regulations for IoT Security
| The Cyber Resilience Act: Implications for Device Manufacturers
| Navigating Compliance with New Regulations
| Balancing Data Collection and Privacy Regulations
| Understanding Device Categories and Compliance Requirements
| Exploring the Cyber Trust Mark in North America
| Navigating Compliance Responsibilities in Organizations
| Leveraging Open Source for Compliance and Security
| Building a Foundation for Compliance with SBOMs
| Integrating Security Standards and Physical Access Threats
| Exploring Security in Smart Devices
| The Role of Memfault in Device Security
| Regulatory Challenges in Device Support
| Compliance and Standards in IoT Security
| Addressing Resource Constraints in IoT Security