Skip to content

IoT and OT hacking and countermeasures  

Photo of Mike Raggo
Hosted By
Mike Raggo .
IoT and OT hacking and countermeasures  

Details

IoT and OT hacking and countermeasures
IoT and OT offer a plethora of possible attack vectors that can lead to infiltration and exfiltration. This talk will focus on real-world examples of these threats. We'll then outline countermeasures for fortifying these devices and networks.

  1. Gain a better understanding of the many IoT and OT protocols and services
  2. Learn how IoT and OT communications can be exploited to infiltrate or exfiltrate your network.
  3. Review techniques for detecting these nefarious IoT and OT behaviors.
  4. Highlight countermeasures for locking down these devices and networks.
Photo of Break Into Cyber Security Group group
Break Into Cyber Security Group
See more events