Главная
Study mode:
on
1
Introduction
2
How do you secure what you dont control
3
About Dimitri
4
Pony Express
5
Assess
6
The 5 Stages
7
Phase 1 of BYOD Denial
8
Phase 2 of BYOD Denial
9
Awareness of Security
10
Insulin Pumps
11
IoT Devices
12
The Reality
13
The Security Pledge
14
The Airspace In
15
IOT Security
16
Bluetooth and ZigBee
17
In the thick
Description:
Explore strategies for securing devices and systems beyond your direct control in this 24-minute conference talk from GrrCon 2016. Delve into the challenges of BYOD policies, IoT security, and emerging technologies like insulin pumps. Learn about the five stages of securing uncontrolled devices, from denial to acceptance, and understand the importance of awareness in cybersecurity. Examine real-world examples, including the Security Pledge and Airspace In, to gain insights into effective security measures for Bluetooth, ZigBee, and other interconnected technologies.

How Do You Secure What You Don't Control

Add to list
0:00 / 0:00