Skip to content

Details

IoT and OT hacking and countermeasures
IoT and OT offer a plethora of possible attack vectors that can lead to infiltration and exfiltration. This talk will focus on real-world examples of these threats. We'll then outline countermeasures for fortifying these devices and networks.

  1. Gain a better understanding of the many IoT and OT protocols and services
  2. Learn how IoT and OT communications can be exploited to infiltrate or exfiltrate your network.
  3. Review techniques for detecting these nefarious IoT and OT behaviors.
  4. Highlight countermeasures for locking down these devices and networks.
Computer Security
Cybersecurity
Black Hat Hacking
White Hat Hacking
Hardware Hacking and Reverse Engineering

Members are also interested in