Finite StateFinite State
Finite StateFinite State
The Future of IoT Security: Conversations from CES 2025
IoT & OTProduct SecurityCompliance & Regulations

The Future of IoT Security: Conversations from CES 2025

Catch Matt's CES25 talk on how IoT security regulations like the CRA & Cyber Trust Mark are driving change, automation, & proactive security strategies.

Finite State Team

Finite State Team

January 15, 2025

At CES 2025, Transforma Insights' founding partner Jim Morrish sat down with Matt Wyckhouse, founder and CEO of Finite State, to discuss the rapidly evolving landscape of IoT security regulations. Their conversation revealed how new regulatory frameworks are transforming the connected device industry, driving meaningful improvements in security standards, and redefining best practices.

HubSpot Video 184989154187

The New Era of IoT Security

The IoT industry is entering an exciting new chapter of enhanced security and trust. During the interview, Matt Wyckhouse highlighted how global regulators are collaboratively establishing comprehensive security frameworks that benefit both manufacturers and consumers. 

These frameworks, led by initiatives like the EU Cyber Resilience Act (CRA) and US Cyber Trust Mark, are creating a unified approach to device security that transcends geographical boundaries. Industry players of all sizes — from innovative startups to tech giants like Google and Amazon — are embracing these standards to build more secure and reliable connected devices. 

Key Regulatory Requirements

The new regulatory landscape introduces several critical requirements for device manufacturers:

  • Generation of Software Bills of Materials (SBOMs) in machine-readable formats
  • Structured vulnerability reporting with defined response times
  • Mandatory minimum 5-year device support periods
  • Clear end-of-life and contract requirements

These requirements represent a significant shift from previous practices, forcing manufacturers to take a more structured approach to security throughout their products' lifecycles and rethink traditional development and maintenance strategies.

The Automation Imperative

One of the most interesting insights from the conversation was the crucial role automation plays in achieving compliance. As Matt Wyckhouse pointed out, the complexity of modern IoT supply chains combined with the frequency of software updates makes manual compliance tracking virtually impossible. This is where companies like Finite State come in, offering automated tools for SBOM generation, vulnerability detection, and compliance monitoring that become the cornerstone of scalable and sustainable IoT security practices.

Moving from Reactive to Proactive Security

Perhaps the most valuable takeaway from the discussion was the emphasis on transitioning from reactive compliance to proactive security. While many organizations initially approach regulations from a compliance-first perspective, the key to success lies in "shifting left" - implementing security measures earlier in the development process and spreading security responsibilities throughout the organization. This proactive approach not only simplifies regulatory compliance but also mitigates risks earlier, fostering long-term resilience against cyber threats.

Looking Ahead

The interview at CES 2025 made it clear that IoT security regulations are not just another bureaucratic hurdle - they're driving a fundamental transformation in how we approach device security. As these regulations continue to evolve, manufacturers who embrace automated tools and proactive security measures will be best positioned to succeed in this new regulatory environment.

The industry is on the cusp of a positive transformation, one that promises better protection for end users and a more structured, globally aligned approach to IoT security. Don’t get left behind! 

Ready to implement automated security tooling? Book a demo to discover what Finite State has to offer. 

Tags

#regulation
Finite State Team

Finite State Team

The Finite State team brings together experts in cybersecurity, embedded systems, and software supply chain risk to help connected device manufacturers secure their products and comply with evolving global regulations.

Related Articles

Road to Compliance: First Steps OEMs and Suppliers Should Take Today

The Road to Compliance: First Steps OEMs and Suppliers Should Take Today

Learn how to achieve Connected Vehicle Rule compliance with six actionable steps — from SBOM & HBOM generation to supplier engagement and risk evaluat...

Oct 20, 2025
Legacy Software & CVR Compliance Carveouts Explained

Legacy Software & CVR Compliance Carveouts Explained

Learn how legacy carveouts and specific authorizations can help you comply with CVR—while time-limited, they demand proactive planning now.

Oct 16, 2025
Regulations Driving IoT Security Forward

Regulations Driving IoT Security Forward

From EU CRA to FDA 524B, IoT regulations are reshaping the market. Learn what manufacturers need for compliance—SBOMs, testing, and supply chain visib...

Sep 24, 2025

Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

Privacy PolicyTerms of UseCustomer Terms and Conditions