Threat Modeling the Internet of Things

Logo
Presented by

David Holmes, Principal Threat Research Evangelist

About this talk

The Internet of Things is finally here. We know because it attacked everyone in October! If you are working at a company that is making—or even using—an Internet-connected gadget, you’ll want to learn how to properly model the threats against it. Legendary security guru David Holmes will walk you through a full threat model assessment process specific to the IoT. Hilarious examples of what not to do are included. This presentation was originally delivered at the F5 Agility conference August, 2017.

Related topics:

More from this channel

Upcoming talks (5)
On-demand talks (269)
Subscribers (12518)
F5 is a multi-cloud application services and security company committed to bringing a better digital world to life.​​​​​​​ F5 partners with the world’s largest, most advanced organizations to secure and optimize every app and API anywhere—on premises, in the cloud, or at the edge. F5 enables organizations to provide exceptional, secure digital experiences for their customers and continuously stay ahead of threats. For more information, go to f5.com.