Posted on
in Presentations
How can the makers of IoT products manage security risk in their legacy products? Despite progress in securing new products, companies face significant challenges with their legacy portfolio. How do you identify weaknesses, respond to customers, engage researchers or prepare for a vulnerability? We will explore these challenges and provide practical recommendations for how to manage these risks.
Access this and other Conference presentations with your free RSAC™ Membership. Your Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with peers and experts, and more.
Share With Your Community