Posted on
in Presentations
The presentation will demonstrate how the National Cybersecurity Center of Excellence’s proof of concept implementations of the Manufacturer Usage Description (MUD) Specification (RFC 8520) can be used in controlling access to IoT devices. Lessons learned and implementation issues will be explored.
Pre-Requisites: Elementary understanding of networking.
Pre-Requisites: Elementary understanding of networking.
Join the RSAC™ Professional Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community