Eleventh Hour IoT Security


Posted on in Presentations

Despite the hype, IoT security has still managed to sneak up on us. Many are learning of IoT deployments with only months (or weeks!) notice, and IT managers are being thrown into the deep end of OT security. This lab will cover real-world IoT threat modeling that IBM X-Force Red has used to help its clients to get a handle on this brave new world of embedded devices and new protocols.

Learning Objectives:
1: Understand the specific challenges facing IT professionals around IoT security.
2: Explore how technical threat modeling can provide IoT security visibility.
3: Learn a realistic, usable process for understanding and securing IoT.

Participants
Krissy Safi

Participant

Sr. Security Services Offering Manager, IBM X-Force Red

Steve Ocepek

Participant

X-Force Red Regional Lead, North America, IBM

Security Strategy & Architecture Mobile & IoT Security

operational technology (OT Security) penetration testing risk management threat management Internet of Things


Topic

Subtopic


Share With Your Community