Designing for the Worst Case – Designing and building IoT devices assuming an attacker has or can get root-level execution
Please note: This session is part of our IoT Device Security Virtual Conference. Learn more and register for the full event here.
A brief foray into how attackers get root-level access, general attack flow and real world examples concluding with how we can use: defense in depth, threat models, and principles of least privilege and secure / immutable configurations to help secure our systems given an attacker has root-level execution.
Jonathan is CTO at Star Lab. Jonathan has more than 20 years experience with offensive and defensive cyber security across a broad range of platforms including: mobile devices, commodity hardware, specialty embedded devices, consumer devices,...
Executive Vice-President, Brand Director, Embedded Franchise, OpenSystems Media
Richard Nass’ key responsibilities include setting the direction for all aspects of OpenSystems Media’s Embedded and IoT portfolios, including digital, print, and live events. Previously, Nass was the Brand Director or UBM’s award-winning Design...