The IoT Requires Upgradable Security

The IoT Requires Upgradable Security

NDC Conferences via YouTube Direct link

Who is the adversary

11 of 26

11 of 26

Who is the adversary

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The IoT Requires Upgradable Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why are we doing this
  3. 3 How do you get two billion devices
  4. 4 The value of the IoT
  5. 5 Security of guns
  6. 6 Security of pacemakers
  7. 7 Classical cybersecurity
  8. 8 IoT devices
  9. 9 IoT security requirements
  10. 10 IoT security is a balancing act
  11. 11 Who is the adversary
  12. 12 Commoditization
  13. 13 Cryptography
  14. 14 Cheap Whisper
  15. 15 IoT Goes Nuclear
  16. 16 EMI Injection
  17. 17 EMI today
  18. 18 Choice of security
  19. 19 New normal attacks
  20. 20 The adversary of 2035
  21. 21 Secure boot
  22. 22 Upgrade strategy
  23. 23 Labels
  24. 24 IoT Security Improvement Act
  25. 25 GDPR
  26. 26 Security is not binary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.