Posted on
in Presentations
Despite the hype, IoT security has still managed to sneak up on us. Many are learning of IoT deployments with only months (or weeks!) notice, and IT managers are being thrown into the deep end of OT security. This lab will cover real-world IoT threat modeling that IBM X-Force Red has used to help its clients to get a handle on this brave new world of embedded devices and new protocols.
Learning Objectives:
1: Understand the specific challenges facing IT professionals around IoT security.
2: Explore how technical threat modeling can provide IoT security visibility.
3: Learn a realistic, usable process for understanding and securing IoT.
Learning Objectives:
1: Understand the specific challenges facing IT professionals around IoT security.
2: Explore how technical threat modeling can provide IoT security visibility.
3: Learn a realistic, usable process for understanding and securing IoT.
Share With Your Community