Description
In this session, we will discuss techniques for understanding and coping with the increase in attack surface introduced by IOT. We will touch on device-specific techniques such as protocol fuzzing and vulnerability assessment, validation of surrounding defensive systems, and the applicability of digital twins in validation scenarios.
Learning Objectives:
- Learn some proactive steps to uncover vulnerabilities of IOT devices of unknown OS, provenance, and security levels
- Adapt the "defense in depth" practice to a post-laptop world with continuous validation of security infrastructure
Speaker(s):