IoT and OT hacking and countermeasures
Details
IoT and OT hacking and countermeasures
IoT and OT offer a plethora of possible attack vectors that can lead to infiltration and exfiltration. This talk will focus on real-world examples of these threats. We'll then outline countermeasures for fortifying these devices and networks.
- Gain a better understanding of the many IoT and OT protocols and services
- Learn how IoT and OT communications can be exploited to infiltrate or exfiltrate your network.
- Review techniques for detecting these nefarious IoT and OT behaviors.
- Highlight countermeasures for locking down these devices and networks.
Computer Security
Cybersecurity
Black Hat Hacking
White Hat Hacking
Hardware Hacking and Reverse Engineering

