No
Yes
View More
View Less
Working...
Close
OK
Cancel
Confirm
System Message
Delete
Schedule
An unknown error has occurred and your request could not be completed. Please contact support.
Scheduled
Wait Listed
Personal Calendar
Speaking
Conference Event
Meeting
Interest
Times for this session to be announced soon.
Conflict Found
This session is already scheduled at another time. Would you like to...
Loading...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
We were unable to load the map image.
This has not yet been assigned to a map.
Search Catalog
Reply
Replies ()
Search
New Post
Microblog
Microblog Thread
Post Reply
Post
Your session timed out.
This web page is not optimized for viewing on a mobile device. Visit this site in a desktop browser to access the full set of features.
LiveWorx 2018

s903 - Lateral Attacks Between Connected Devices In Action

Session Description

While popular media has focused on threats like botnets of compromised cameras, the bigger risk from IoT devices is of lateral attacks between IoT devices - consumer, industrial or both. This requires increased awareness on the part of organizations of all sizes. IoT devices are segmented from business networks and considered untrustworthy. But if they are risky, why do we trust them on a network at all? Using critical vulnerabilities in popular devices, we will demonstrate the threat posed by lateral attacks, illustrating that segmentation alone is an insufficient defense.


Session Presenter
Additional Information
IoT
IoT, Cybersecurity, IT Security, DFAR Regulations and Secure Cloud Compliance in FA&D
Understand common IoT device risks and how Internet of Things devices are vulnerable to attack by malicious adversaries.
Understand how attackers can move laterally between vulnerable and compromised IoT endpoints and high value IT assets in a network environment.
Address strategies to segment and secure IoT devices in sensitive environments.
Breakout Session
45 minutes
Session Schedule