Security For the Internet of Things: A Practical Approach

Episode 7 of the Dark Reading Cybersecurity Crash Course

Today’s IT environment increasingly employs a variety of devices that are intelligent and Internet-connected – but are not computers or phones. What’s the best strategy for securing these devices as they are added to your corporate computing environment? What can you do during the deployment phase to ensure that attackers don't use these devices as a means to compromise your corporate data? A top IoT security expert offers some insight.

Available:
Thu, Mar 08, 2018 10:00 AM PST / 01:00 PM EST
Duration:
1h 00min

Attend this session and:

  • Get a rundown of the latest, myriad ways attackers are manipulating IoT devices to attack organizations  and what the threat of IoT botnets means to the enterprise
  • Learn how to insulate yourself from inbound IoT threats by taking a fresh look at your network security and port controls
  • Learn what new internal policies and practices are necessary to prepare for an IoT-rich future

Featured Speakers

  • Daniel   Miessler
    Daniel Miessler
    Director of Advisory Services
    IOActive

    Daniel Miessler is the Director of Advisory Services at IOActive and has 17 years of experience in information security. His background is in technical security testing and enterprise defense, including network, web, application, mobile, IoT testing, and adversary-based risk management. He is the leader of the OWASP IoT Security project and speaks regularly at conferences, on panels, and to the media on the topics of information security and technology trends. He also produces a blog, podcast, and newsletter with similar themes.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By