ICS/IoT Embedded Security - It Needs to Be More than Isolate and Pray


Posted on in Presentations

This BoF session is to discuss where security practitioners, OEMs, and developers are in terms of ensuring the security of embedded systems in industrial & critical infrastructure environments. Currently, defenders have few options other than hoping for updates, and isolating deployed systems. Consequently, we need improved secure system designs, verifiable firmware, (and more) by default.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.

Please note you are only able to Schedule/Reserve one Birds of a Feather session.

This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Participants
Amie Wozniak

Participant

Project Manager, Nth Degree

Cecilia Marinier

Participant

RSA Conference Program Manager, Self Employed

Ronald Brash

Facilitator, Participant

Director, Cyber Security Insights, Verve Industrial Protection

Technology Infrastructure & Operations

critical infrastructure Internet of Things secure coding operational technology (OT Security) industrial control security


Topic

Subtopic


Share With Your Community