Please note: This session is part of our IoT Device Security Virtual Conference. Learn more and register for the full event here.
Endless patching is a race that cannot be won. To build sustainable, secure IoT solutions we must change that ineffective paradigm.
To appreciate what we can do differently, we should start by considering both the defender and attacker perspectives. This session will provide a unique view of that attacker's perspective, from former exploit/attack experts within the IDF Unit 8200. We will review the impossible task of identifying and mitigating all vulnerabilities and demonstrate the inadequacies of current IoT security practices focused on continuous patching, static analysis, encryption and risk controls. We will also explain how attackers can easily evade such barriers.
By contrast, the session will explore methods for achieving embedded, on-device runtime exploits protection to immunize devices from all underlying vulnerabilities, and provide zero-day protection. These methods, commonplace in IT endpoint detection and response, are now finding their way into unprotected and unmanaged IoT edge devices.
Natali Tshuva brings over 10 years of experience, both as a cybersecurity researcher and a team leader. After graduating magna cum laude B.Sc. in Computer Science at the age of 19, as part of a special program for gifted and talented kids, Natali...
Executive Vice-President, Brand Director, Embedded Franchise, OpenSystems Media
Richard Nass’ key responsibilities include setting the direction for all aspects of OpenSystems Media’s Embedded and IoT portfolios, including digital, print, and live events. Previously, Nass was the Brand Director or UBM’s award-winning Design...