Posted on
in Presentations
While IoT manufacturers and security vendors are focused on IoT device security, hackers are targeting the entire IoT ecosystem—the cloud servers, mobile applications and more that make up the entire solution. This session will take an adversarial perspective on the IoT, with specific examples of successful approaches and tactics.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community