Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of IoT security from a hacker's perspective in this eye-opening keynote address. Gain insights into the limitations of current IoT defense strategies, including continuous patching, static analysis, encryption, and risk controls. Discover why these approaches often fall short in protecting devices from sophisticated attacks. Learn about innovative methods for achieving embedded, on-device runtime exploits protection that can immunize IoT devices against underlying vulnerabilities and provide zero-day protection. Drawing from the expertise of former IDF Unit 8200 exploit and attack specialists, understand how attackers can easily bypass traditional security measures and why a paradigm shift is necessary for building sustainable, secure IoT solutions. Delve into the potential of applying IT endpoint detection and response techniques to previously unprotected and unmanaged IoT edge devices, paving the way for more robust and effective IoT security practices.