Download pdf
Download pdf
Security in the Internet of Things may seem intractable in the face of the flow of new hacks and new breaches. But patterns can be seen in the vectors used in the hacks, and methods exist that can close the gaps making IOT systems defensible. This session will summarize the key attack vectors and show which security concepts and requirements can mitigate the risk of attacks using those vectors.

Learning Objectives:
1: Learn promising practices for operational security excellence in IoT environments.
2: Learn through the discussion of a set of questions that can help shape the strategy and prioritize IoT solutions.
3: Leave with an integrated security architecture approach to IoT solutions.

Basic security tenant and understanding of connected environment; knowledge if IoT device architecture; understanding of common attack patterns.