Posted on
in Presentations
The low-hanging fruit security problems shifted from the OS towards ISVs and IoT / embedded systems. This session will explore why the latter is how organisations will be compromised by red teams, hackers and nation-state actors alike. Two exploits by the Equation Group and one by GoSecure will be explored. The session will conclude with a live demo of how to quickly assess your hardware’s security.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community