Posted on
in Presentations
The insecurity of legacy and embedded systems affects the financials, medical and critical infrastructure industries. We demonstrate how a threat actor targets these systems without the use of any zero-day, just by using a 10-year-old exploit to penetrate a critical device, disrupt its activities and tamper with its controls.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community