Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Into the Mind of an IoT Hacker - How to Protect IoT Networks & Devices

RSA Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into the mind of an IoT hacker in this 40-minute conference talk from RSA Conference. Explore how cyber-attackers target organizations through simple yet devastating IoT attacks, leaving businesses vulnerable. Learn about recent IoT attack examples, techniques for overtaking unmanaged devices, and methods to expose risks across IT/OT networks. Discover strategies for creating effective IoT device security policies and preventing both network-based and device-level attacks. Gain valuable insights into IoT security customer types, device deployment within networks, and internet scanning for IoT devices. Examine the vulnerabilities of smart lighting and buildings, as well as medical equipment like ultrasound machines. Explore comprehensive solutions for IoT security, including device discovery, identity mapping, automated policy building, and enforcement. Understand the importance of virtual patching and runtime protection in safeguarding IoT networks and devices.

Syllabus

Intro
IOT SECURITY CUSTOMER TYPES
HOW MANY IOT DEVICES ARE DEPLOYED INSIDE THE NETWORK?
SCANNING THE INTERNET FOR IOT DEVICES
IOT DEVICES ARE EASY TO HACK INTO
EXPLOIT IOT VULNERABILITIES
THE DARK SIDE OF SMART LIGHTING
TAKE CONTROL OVER SMART BUILDING
HACKING INTO AN ULTRASOUND MACHINE
IOT DEVICES POSE A HUGE SECURITY RISK
FROM DISCOVERY TO POLICY ENFORCEMNET
IDENTIFY EVERY IOT DEVICE ON THE ENTIRE NETWORK
GRANULAR IDENTITY DETAILS FOR EVERY IOT DEVICE
SEAMLESSLY TURN THE IOT INTELLIGENCE MAP INTO A NETWORK SECURITY POLICY
SAVE TIME AND EFFORT WITH AUTOMATED IOT POLICY BUILDER
ENFORCE THE IOT NETWORK POLICY
VIRTUAL PATCHING PROTECT DEVICES FROM KNOWN EXPLOITS
PREVENT ATTACKS WITH ON DEVICE RUNTIME PROTECTION

Taught by

RSA Conference

Reviews

Start your review of Into the Mind of an IoT Hacker - How to Protect IoT Networks & Devices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.