Video: Your IoT devices may be weaponized (and what to do about it)

This presentation explores the impact of the known weakest point in our cyber-defenses: the IoT device.

One of the most significant areas for cyberattacks on businesses, networks, utilities and other critical infrastructure is through IoT devices. These attacks range from denial of service to ransomware and information theft to aggressive destruction of information and cyber-physical systems. The devices involved can range from security cameras to monitoring devices and any other device or control system that is either connected or considered “smart.” Who cares if someone hacks your security camera or non-critical IoT device?

This presentation from the "Road to RxM" track at Smart Industry 2018 explores the impact of the known weakest point in our cyber-defenses: the IoT device. Presented by Howard W Penrose, Ph.D., CMRP, 2018 Chair of the SMRP, this video clip will examine some of the strategies and the framework developed by the U.S. government that can improve the trustworthiness and resiliency in the digital Wild West.

New call-to-action

Show Comments
Hide Comments

Join the discussion

We welcome your thoughtful comments.
All comments will display your user name.

Want to participate in the discussion?

Register for free

Log in for complete access.

Comments

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments