Internet of Things
Security Congress Abstract
Tens of billions of internet-connected devices are now online, most of which lack even basic security controls. This sprawling new attack surface is placing extraordinary pressure on enterprises and their security teams. In this session, we will explain why conventional control and mitigation assumptions are not suited to address the dynamic nature of IoT ecosystems, where devices often use intermittent connections and switch and/or reroute data to alternative networks. We will explain a new approach to assessing security risk that takes into account the flexible and fractured design of IoT ecosystems. Attendees will learn how to chain together vulnerability data and potential exploit paths to dynamically analyze threats, predict attacks and take remediation actions to protect against them.