• About
    Please note: This session is part of our IoT Device Security Virtual Conference. Learn more and register for the full event here.

    Endless patching is a race that cannot be won. To build sustainable, secure IoT solutions we must change that ineffective paradigm.

    To appreciate what we can do differently, we should start by considering both the defender and attacker perspectives. This session will provide a unique view of that attacker's perspective, from former exploit/attack experts within the IDF Unit 8200. We will review the impossible task of identifying and mitigating all vulnerabilities and demonstrate the inadequacies of current IoT security practices focused on continuous patching, static analysis, encryption and risk controls. We will also explain how attackers can easily evade such barriers.

    By contrast, the session will explore methods for achieving embedded, on-device runtime exploits protection to immunize devices from all underlying vulnerabilities, and provide zero-day protection. These methods, commonplace in IT endpoint detection and response, are now finding their way into unprotected and unmanaged IoT edge devices.
  • Price
  • Language
    Anyone with the event link can attend
  • Dial-in available
    (listen only)
    Not available.