The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
In this session, we will discuss techniques for understanding and coping with the increase in attack surface introduced by IOT. We will touch on device-specific techniques such as protocol fuzzing and vulnerability assessment, validation of surrounding defensive systems, and the applicability of digital twins in validation scenarios.
Learning Objectives:
Learn some proactive steps to uncover vulnerabilities of IOT devices of unknown OS, provenance, and security levels
Adapt the "defense in depth" practice to a post-laptop world with continuous validation of security infrastructure