Virtual Session: Internet of Things Hacking

Shared by Tom Brennan

Many of our clients ask about internet connected device testing and how to prepare for all of the "What ifs."  ProactiveRisk is pleased to announce that we are co-sponsoring a deep-dive into this area with Steven Teppler and Rudresh Vishruta on Feb 6th at 6:30pmEST LIVE.

 Virtual Session: Internet of Things Hacking
 
 

Join us from anywhere in the world using GotoWebinar

Save My Spot

IoT Top 10

The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies.
 
Learn about the OWASP IoT Top 10 project, testing techniques and research advancements in this space.
  1. Weak Guessable, or Hardcoded Passwords
  2. Insecure Network Services
  3. Insecure Ecosystem Interfaces
  4. Lack of Secure Update Mechanism
  5. Use of Insecure or Outdated Components
  6. Insufficient Privacy Protection
  7. Insecure Data Transfer and Storage
  8. Lack of Device Management
  9. Insecure Default Settings
  10. Lack of Physical Hardening
Find out what proactive steps you can do to protect your enterprise and how to test for these conditions. 
 

 

Ubiquity and Monoclones - Security Threat Vectors and the Potential for Mass Legal Liability

With more than 70 billion connected endpoints projected to be deployed by 2020, the potential for security, privacy, integrity and safety problems are increased by orders of magnitude. We’ll discuss the tech and the manufacturing communities’ commitment (or lack) to quality programming, testable reliability, and a uniform approach to either sunsetting or maintaining such endpoints to maintain adequate physical and logical protections.
 
Learn from expert speaker Cyber Security and Privacy Chairman Steve Teppler. He will discuss the tech and the manufacturing communities’ commitment (or lack) to quality programming, testable reliability, and a uniform approach to either sun-setting or maintaining such endpoints to maintain adequate physical and logical protections.
 
Attend and earn CPE credits and knowledge in this space


Speaker: Steven Teppler
https://www.lawfirm.ms/steven-w-teppler

Can't make it? Don't worry! Register below, shoot us an email to let us know, and we'll make sure to send you the recording. 

Save My Spot

 

Subscribe to our security news