“Who Let the IoT in?”
“Who Let the IoT in?”
Sometime after New Year's confetti has fallen, organizations will face a silent but very real serious security crisis: a wave of new, Internet connected consumer devices that have shed their wrapping paper and moved from homes to employees' desks and cubicles.
This is the Internet of Things, where low cost consumer devices often harbor serious security holes and make easy prey for cyber criminals and other bad actors. What can you do to get control of these rogue devices?
Issues Discussed:
- DDoS / Dyn Attack
- Internet of Radios Security Issues
- Enterprise Security
Speakers:
Paul Roberts, Editor, SecurityLedger (Moderator)
Mark Ray, PwC, Director of Cyber Investigations and Breach Response (former FBI)
Bob Baxley, Chief Engineer, Bastille Networks
Ted Harrington, Independent Security Evaluators - ISE runs the IoT villages at conferences like DEF CON
INTRODUCTION TO THE SECURITY FOR THE INTERNET OF THINGS
The proliferation of mobile devices, cheap radio sensors with microphones, cameras and transmitters means that Enterprise Airspace is under constant threat from a new generation of Internet connected devices. Data exfiltration whether by accident or on purpose has never been easier.
As the number of Internet connected devices grows to more than 50 billion by 2020, the Internet of Things will provide an unprecedented expansion of new threat vectors and Enterprise firms need to be able to respond.
You can learn more about BYOD, Mobile and IoT Security with Mike Engle, co-founder of Bastille Networks.
Topics Include:
- Internet of Things: Think security headache
- How do software defined radios come into play?
- What does the IoT mean for enterprise security?
- MouseJack: A connected device threat today
- What can you do to secure your airspace?
- Use Cases
- Case Study: Datacenter