This document summarizes an IoT panel discussion on security for hardware, software, and sensors. The panelists discussed distinguishing characteristics and security concerns for industrial versus consumer IoT applications. They addressed important components of an IoT security architecture like authentication, corruption prevention, and spoofing protection. Panelists also discussed security considerations for sensors, software, hardware, and cloud services - including verifying sensor access, preventing hacking or software corruption, and protecting data in the cloud. The audience then asked questions of the panelists from Flexera Software, Red Hat, RTI, and ThingWorx.