Shadow IoT Hacking the Corporate Environment: Office as the New Smart Home


Posted on in Presentations

BYOIoT devices are popping up on corporate networks in the thousands. Enterprises may think they have a security strategy, but many underestimate the havoc that IoT can wreak. A “vendor” sends you a vulnerable or modified device, and broken protocols are easy pickings for hackers. Watch live demos of attack on consumer IoT in a “secure” office environment and learn from an expert how to fight back.

Learning Objectives:
1: Understand how to find and classify shadow IoT.
2: Learn how attacks can be chained from device to device without setting off network monitoring tools.
3: Delve into the common and often overlooked characteristics of devices that make them vulnerable.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Ondrej Vlcek

Participant

Chief Technology Officer, Avast


Share With Your Community