Overview
Explore the implications of widespread hacking in everyday devices in this 46-minute conference talk from RSA Conference. Delve into the "Cyber-Circus" as Keren Elazari, an analyst, author, and senior researcher from Tel Aviv University, examines the trust people place in common objects like baby monitors, cars, and insulin pumps. Discover how researchers demonstrate vulnerabilities in these devices and consider the role of friendly hackers in improving product safety. Learn about high-profile hacks, Internet-of-Things attacks, and media reactions while exploring topics such as hacking Teslas and pacemakers, the Mirai botnet, and the impact of connected device vulnerabilities. Gain insights into trust and safety concerns, the responsibilities of Chief Security Officers, and the importance of bug bounty programs in addressing cybersecurity challenges.
Syllabus
Intro
Who am I
The tightrope balancing act
Hacking Teslas
Hacking pacemakers
How to find connected devices
Why Mirai
The Media
Barbie and baby monitors
Blackout in Brussels
Stop the spread of fad
Trust and safety
You are a CSO
The FTC
I Am The Cavalry
Bug Bounty Programs
Katie Missouri
Conclusion
Taught by
RSA Conference