Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security threats posed by IoT, OT, and network devices in this eye-opening conference talk. Delve into how purpose-built connected devices that don't allow EDR software installation have become prime targets for nefarious actors, including nation-states, cybercriminals, and insiders. Discover the tools like Fronton, developed by countries such as Russia, specifically designed to attack and control these devices. Learn about the unique research conducted across millions of devices and hundreds of organizations worldwide, revealing key insights on device visibility, vulnerabilities, and exploits. Understand the wide-ranging impacts of these compromises, from unlocking doors and shutting down power to cryptocurrency mining and ransomware attacks. Gain valuable knowledge on the most exploited device types, real-world war stories, and effective methods to mitigate risks. Walk away with practical takeaways on how to identify vulnerable devices, address the challenges of scale in fixing issues, and implement strategies to maintain security. Take control of your IoT, OT, and network devices and protect your IT and cloud-based assets from this emerging cybersecurity frontline.