Posted on
in Presentations
Attendees will gain insight into how IoT hackers hit various organizations with simple cyber-attacks which leave businesses paralyzed. We will cover examples of recent IoT attacks and how they’re achieved, how hackers overtake unmanaged IoT devices, how to expose risks across IT/OT networks, how to create policies that secure IoT devices, and how to prevent network-based and device-level attacks.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community