Posted on
in Presentations
The insecurity of legacy and embedded systems affects the financials, medical and critical infrastructure industries. We demonstrate how a threat actor targets these systems without the use of any zero-day, just by using a 10-year-old exploit to penetrate a critical device, disrupt its activities and tamper with its controls.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community