SLIDE 1
- Security Policies – Who has them? Do we need them?
- Wireless Encryption – Where have we been and were are we going?
- The Wireless Spectrum – where does wireless fit?
- A Quick Look – Meraki, Ruckus
- Encryption Method
- Authentication Method
- Encryption Algorithm
- Network Infrastructure – Better Security
- Fun Facts about the Internet of Things – (Time Permitting)