How IoT Expands Hackers Attack Surface

Logo
Presented by

Amit Waisel, Senior Cybersecurity Engineer, XM Cyber

About this talk

How do hackers infiltrate organizations through IoT connected devices? What can be done to prevent the next attack via an IoT device? Why can a weakened link in the IoT chain lead to compromised digital assets? The Internet of Things (IoT) is bringing convenience to consumers and process optimization to businesses, but it comes at a cost. Exploding onto the IT scene and the consumer world, it has created endless opportunities for a super-connected environment. But IoT could also signal the next security crisis. IoT formed a rising tide of shadow IT and a new frontier to data security vulnerabilities, in an ever-expanding attack surface. By joining this webinar with XM Cyber’s Security Expert, Amit Waisel, you will learn about the perils of an expanding attack surface and what can be done to prevent an APT attack via an IoT connected device. We will dive into hard core questions including: - How an ever-expanding IoT attack surface is creating multiple opportunities for the perfect attack vector to digital assets - Why an innocent aquarium thermometer, defibrillator or printer is a possible gateway to disaster - Steps you can take to avoid a potential crisis About the Speaker Amit Waisel is a Senior cybersecurity Engineer at XM Cyber. He is a seasoned data security expert with vast experience in cyber offensive projects. Prior to XM Cyber, Amit filled multiple data security positions in the Israel intelligence Corps. He graduated from the Open University with a BSc. in Computer Science and is currently completing a MSc. degree in Computer Science at Tel Aviv University.

Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (1788)
Subscribers (193975)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.