Finite StateFinite State
Finite StateFinite State
Bridging the Security Gap in Connected Products: Key Takeaways from Our Webinar with Beecham Research and Aeris
IoT & OTProduct Security

Security Gaps in Connected Products: Takeaways from Beecham Research & Aeris Webinar

Explore key IoT security insights from our webinar with Beecham Research and Aeris—covering global regulations, SBOMs, and secure-by-design strategies.

Matt Wyckhouse

Matt Wyckhouse

Founder & CEO

May 9, 2025

In a rapidly shifting landscape where connected devices underpin everything from automotive systems to industrial control and healthcare equipment, ensuring security and compliance is no longer optional.

On May 7th, I joined a compelling discussion with Beecham Research and Aeris, unpacking the latest challenges and strategies in IoT cybersecurity. Here are the key takeaways—and why they matter for organizations navigating the complexities of software supply chain security.

1. Global Regulations Are Raising the Bar 

Governments across the globe are tightening compliance expectations, with frameworks like the EU Cyber Resilience Act (CRA), CE RED, and the U.S. Cyber Trust Mark reshaping product development priorities. A central theme in our discussion was how regulatory momentum is accelerating faster than many manufacturers can adapt.

I emphasized that organizations need to move beyond checkbox compliance and invest in continuous visibility across their software supply chains. With shifting enforcement timelines and penalties for non-compliance, early preparation isn’t just advantageous—it’s essential.

“You can’t secure what you can’t see. Without a living SBOM strategy, companies will always be behind.”

2. Device Insecurity Is a Business Risk, Not Just a Technical One 

We agreed during the panel that cybersecurity is no longer just an engineering or IT issue. Insecure devices now directly impact enterprise risk, including financial exposure, brand reputation, and regulatory liability.

Connected product security must be embedded into the business strategy, not bolted on as an afterthought. Manufacturers who ignore the security of their embedded software and third-party components risk long-term fallout.

3. Visibility and Collaboration Are the Foundation 

Another key theme was the importance of visibility across every layer of the device stack—from source code and open-source dependencies to firmware and cloud APIs. The discussion highlighted how manufacturers often lack unified tools to manage this complexity.

At Finite State, our approach centers on transparency, automation, and collaboration:

  • Automatically generate and manage SBOMs for any software or firmware
  • Correlate vulnerabilities from over 200 sources
  • Integrate security insights into DevSecOps workflows

These capabilities empower cross-functional teams to make risk-informed decisions throughout the product lifecycle.

4. Secure-by-Design Requires Expert-Led Guidance 

We also explored the need for security leadership at the design stage. It’s not just about tools; it’s about embedding secure development principles from the start.

This is where Finite State’s policy-driven consulting and secure SDLC guidance add value—from virtual Chief Product Security Officer (vCPSO) support to independent security validation services. 

“Secure-by-design isn’t a buzzword. It’s a survival strategy.”

Conclusion

Connected product security is evolving from a siloed responsibility to a board-level concern. The organizations that thrive in this new environment will be the ones that treat software supply chain security as a strategic, cross-functional initiative.

With Finite State, you gain more than just visibility—you gain a trusted partner to help you identify risk, prioritize remediation, and achieve compliance with confidence.

To see how we can support your team with end-to-end software supply chain security, book a demo today.

Matt Wyckhouse

Matt Wyckhouse

Founder & CEO

Matt Wyckhouse is CEO of Finite State and a recognized leader in cybersecurity, with over 20 years of experience securing software supply chains, IoT, and embedded systems. Formerly the founding CTO of Battelle’s Cyber Innovations Unit, he now leads Finite State’s mission to protect connected products from supply chain threats.

Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

Privacy PolicyTerms of UseCustomer Terms and Conditions