ICS/Critical Infrastructure

3313 - IoT and IIoT Wireless Network Threats and Countermeasures

Wednesday, October 10
1:45 PM - 2:45 PM
Location: Floor 2: Galerie 1

Current attack vectors indicate that nefarious attacks are increasingly targeting IoT wireless infrastructures. Some 95 percent of IoT is wireless, yet most organizations lack a defense-in-depth strategy to address this growing wireless threat landscape consisting of a plethora of new protocols and frequencies including: Wi-Fi, ZigBee, Z-Wave, Bluetooth, P25, M2M communications, and more. This has generated a new wireless threat landscape, as these risks and threats target not only the enterprise network, but autonomous IIoT networks, as well as nearby threats from drones, spy cameras, and more. In this presentation we’ll explore the anatomy of these attacks and categorize these threats to develop an updated defense-in-depth strategy for the evolving IoT wireless threat landscape.


 

Learning Objectives:

Michael Raggo, CISSP, NSA-IAM, CSI

CSO
802 Secure, Inc.

Michael T. Raggo, Chief Security Officer, 802 Secure (CISSP, NSA-IAM, ACE, CSI) has omore than 20 years of security research experience. His current focus is wireless IoT threats impacting the enterprise. Michael is the author of Mobile Data Loss: Threats & Countermeasures and Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols for Syngress Books, and contributing author for Information Security the Complete Reference 2nd Edition. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, and is a frequent presenter at security conferences, including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon and SANS.

Presentation(s):

Send Email for Michael Raggo


Assets

3313 - IoT and IIoT Wireless Network Threats and Countermeasures

Audio

Audio

Presentation Slides

Slides

Video

Video


Attendees who have favorited this

Please enter your access key

The asset you are trying to access is locked. Please enter your access key to unlock.

Send Email for IoT and IIoT Wireless Network Threats and Countermeasures