Find It Before They Do: Best Practices for IOT Security
Through wearables, AR, and connected healthcare devices become ubiquitous, people are increasingly reliant on nonstop, secure connectivity for health, information, and entertainment. With this great convenience comes great risk; some threats are obvious and some quite subtle. In this discussion, we’ll examine the three key links in the chain, potential weaknesses and how to secure them:
- Endpoint devices themselves
- The communication network, increasingly 5G
- Back-end cloud services
As these are often provided by different entities, standards and interoperability become important, but each of these links is subject to risks and limitations imposed by the other. In this presentation, we’ll discuss the best practices for secure design and validation at each step to ensure a trusted and reliable hyper-connected world.
About Andy Young
Andy has been performing application and security testing for 20 years, as well as more recently helping customers understand threats and risks posted by threat actors targeting them. In his current role within Keysight's Application Threat Intelligence team, Andy helps shape innovative new security solutions. Currently responsible for helping SecOps team continuously measure, manage and improve their cybersecurity effectiveness with Breach and Attack Simulation, as well as Validate Wi-Fi, cellular, Ethernet, CAN bus, Bluetooth, and BLE connected devices.