Главная
Study mode:
on
1
Intro
2
We dont communicate
3
Bug Fetishing
4
Bluetooth Vulnerability
5
Is it new
6
Sexual nature of bugs
7
The giant press
8
The small issues
9
Cost
10
Cost of doing business
11
Wearable technology
12
Zero trust
13
Vulnerability
14
Bug bounties
15
No more nuclear weapons
16
The information security industry is dying
17
Charles Bukowski poem
Description:
Explore the evolving landscape of Internet of Things (IoT) security in this thought-provoking keynote presentation from the 44CON Information Security Conference. Delve into the misconceptions surrounding IoT, examining how it represents the next wave of computing rather than just a trend. Discover why focusing solely on hacking potential misses the bigger picture of technological advancement. Learn about the blurring boundaries between endpoints and cloud services, and understand the shifting risk landscape where businesses face greater threats than consumers. Gain insights into new security models that have been overlooked and explore cost-effective strategies to combat emerging challenges. Reflect on the industry's role in supporting technological evolution and the importance of adapting security principles to new paradigms. Leave with a renewed commitment to information security and a fresh perspective on IoT as "The Internet of Us."

The Internet of Us

44CON Information Security Conference
Add to list
0:00 / 0:00