Michele Guel, Distinguished Engineer/IoT Security Strategist, Cisco Systems
Security in the Internet of Things may seem intractable in the face of the flow of new hacks and new breaches. But patterns can be seen in the vectors used in the hacks, and methods exist that can close the gaps making IOT systems defensible. This session will summarize the key attack vectors and show which security concepts and requirements can mitigate the risk of attacks using those vectors.Learning Objectives:1: Learn promising practices for operational security excellence in IoT environments.2: Learn through the discussion of a set of questions that can help shape the strategy and prioritize IoT solutions.3: Leave with an integrated security architecture approach to IoT solutions.Pre-Requisites:Basic security tenant and understanding of connected environment; knowledge if IoT device architecture; understanding of common attack patterns.
Related Post:
- SAS IoT Analytics Solutions – We're All Connected
- IoT: Gigantic Network of Connected Devices | IoT Tutorial | IoT Internet of Things | Edureka
- Ripple/XRP- RTGS Fully Operational Reserve Bank Of India,Two Sleeping Giants In Crypto
- Lisk.js 2019 | Sidechain Solutions: Blockchain Solutions & Services for Lisk [Part 10 of 12]
- Legamaster STX – A touch of excellence
- VRC Excellence Award Judging Process
- Cardano Achieving Success BUT #Cardano ADA Future Rests On Shelly
- Bitcoin Resurrects Once Again! Electroneum Down BUT Look at What They Are Achieving
- Cardano(ADA) and IOTA are 2 years away from achieving their goals?
- Join IoT in Action to Build Transformational IoT Solutions