Threat Modeling the Internet of Things

Logo
Presented by

David Holmes, Principal Threat Research Evangelist

About this talk

The Internet of Things is finally here. We know because it attacked everyone in October! If you are working at a company that is making—or even using—an Internet-connected gadget, you’ll want to learn how to properly model the threats against it. Legendary security guru David Holmes will walk you through a full threat model assessment process specific to the IoT. Hilarious examples of what not to do are included. This presentation was originally delivered at the F5 Agility conference August, 2017.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (284)
Subscribers (13723)
F5 is a multicloud application security and delivery company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure every app—on premises, in the cloud, or at the edge. F5 enables businesses to continuously stay ahead of threats while delivering exceptional, secure digital experiences for their customers. For more information, go to f5.com.