Loading…
CloudEXPO 2019 has ended
Monday, June 24 • 11:00am - 11:35am
Hacking into IoT - How to Keep the Bad Guys Out and Let the Good Guys In

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
Hacking into IoT - How to Keep the Bad Guys Out and Let the Good Guys In

History of how we got here. What IoT devices are most vulnerable? This presentation will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The hacking of IoT devices and systems explained in 6 basic steps.

On the other side, protecting devices continue to be a challenging effort. Product vendors/developers and customers are all responsible for improving IoT device security.

The top 10 vulnerabilities will be presented and discussed.

1. Insecure Web Interface
2. Insufficient Authentication/Authorization
3. Insecure Network Services
4. Lack of Transport Encryption/Integrity Verification
5. Privacy Concerns
6. Insecure Cloud Interface
7. Insecure Mobile Interface
8. Insufficient Security Configurability
9. Insecure Software/Firmware
10. Poor Physical Security3 things the audience will walk away with include:

1. Basic areas of vulnerability
2. Types of attacks
3. How to protect from these areas and make the systems more functional and secure.

Speakers
avatar for Don Malloy

Don Malloy

Chair, OATH
Donald Malloy is the Chairman of OATH, The Initiative for Open Authentication. OATH is an industry alliance that has transformed the authentication market from proprietary systems to an open source standard based architecture promoting ubiquitous strong authentication used by most... Read More →



Monday June 24, 2019 11:00am - 11:35am
09 IoT | IIoT | Smart Cities Room 206