Download pdf
BYOIoT devices are popping up on corporate networks in the thousands. Enterprises may think they have a security strategy, but many underestimate the havoc that IoT can wreak. A “vendor” sends you a vulnerable or modified device, and broken protocols are easy pickings for hackers. Watch live demos of attack on consumer IoT in a “secure” office environment and learn from an expert how to fight back.

Learning Objectives:
1: Understand how to find and classify shadow IoT.
2: Learn how attacks can be chained from device to device without setting off network monitoring tools.
3: Delve into the common and often overlooked characteristics of devices that make them vulnerable.