Into the Mind of an IoT Hacker | How to Protect IoT Networks & Devices

Posted on in Presentations

Attendees will gain insight into how IoT hackers hit various organizations with simple cyber-attacks which leave businesses paralyzed. We will cover examples of recent IoT attacks and how they’re achieved, how hackers overtake unmanaged IoT devices, how to expose risks across IT/OT networks, how to create policies that secure IoT devices, and how to prevent network-based and device-level attacks.

Itzik Feiglevitch


Product Manager, Check Point Software Technologies

Justin Sowder


Regional Architect, Check Point Software Technologies

Share With Your Community