Presented at
Wild West Hackin' Fest 2017,
Oct. 28, 2017, 9 a.m.
(45 minutes).
TLDR: “In the midst of chaos, there is also opportunity” Applying the strategies and precepts of this ancient treatise on bellicose arts to the attack and defense of Internet of Things. Using examples from recent InGuardians work, we will look at some of the most common ways to exploit IOT devices and what we suggest can be done to raise the bar in their defense.TLDR: “In the midst of chaos, there is also opportunity” Applying the strategies and precepts of this ancient treatise on bellicose arts to the attack and defense of Internet of Things. Using examples from recent InGuardians work, we will look at some of the most common ways to exploit IOT devices and what we suggest can be done to raise the bar in their defense.
Presenters:
-
Mike Poor
- InGuardians
Mike is a founder and senior security analyst for the DC firm InGuardians, Inc. In the past he has worked for Sourcefire as a research engineer and for SANS leading their intrusion analysis team. As a consultant, Mike conducts incident response, breach analysis, penetration tests, vulnerability assessments, security audits, and architecture reviews. His primary job focus, however, is in intrusion detection, response, and mitigation. Mike currently holds the GCIA certification and is an expert in network engineering and systems and network and Web administration. Mike is an author of the international best selling Snort series of books from Syngress, a member of the Honeynet Project, and a handler for the SANS Internet Storm Center.
Links:
Similar Presentations: