Posted on
in Presentations
BYOIoT devices are popping up on corporate networks in the thousands. Enterprises may think they have a security strategy, but many underestimate the havoc that IoT can wreak. A “vendor” sends you a vulnerable or modified device, and broken protocols are easy pickings for hackers. Watch live demos of attack on consumer IoT in a “secure” office environment and learn from an expert how to fight back.
Learning Objectives:
1: Understand how to find and classify shadow IoT.
2: Learn how attacks can be chained from device to device without setting off network monitoring tools.
3: Delve into the common and often overlooked characteristics of devices that make them vulnerable.
Learning Objectives:
1: Understand how to find and classify shadow IoT.
2: Learn how attacks can be chained from device to device without setting off network monitoring tools.
3: Delve into the common and often overlooked characteristics of devices that make them vulnerable.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community