Главная
Study mode:
on
1
Intro
2
Why are we doing this
3
How do you get two billion devices
4
The value of the IoT
5
Security of guns
6
Security of pacemakers
7
Classical cybersecurity
8
IoT devices
9
IoT security requirements
10
IoT security is a balancing act
11
Who is the adversary
12
Commoditization
13
Cryptography
14
Cheap Whisper
15
IoT Goes Nuclear
16
EMI Injection
17
EMI today
18
Choice of security
19
New normal attacks
20
The adversary of 2035
21
Secure boot
22
Upgrade strategy
23
Labels
24
IoT Security Improvement Act
25
GDPR
26
Security is not binary
Description:
Explore the critical importance of upgradable security in the Internet of Things (IoT) landscape in this 35-minute conference talk. Delve into the economic potential and security challenges of IoT devices, examining real-world examples like gun and pacemaker security. Understand the unique security requirements for IoT devices and the balancing act between functionality and protection. Investigate the evolving threat landscape, including commoditization of attacks, cryptographic vulnerabilities, and emerging techniques like EMI injection. Learn about secure boot processes, upgrade strategies, and the impact of regulations such as the IoT Security Improvement Act and GDPR. Gain insights into future-proofing IoT security against adversaries of 2035 and beyond, emphasizing that security is not a binary state but a continuum requiring constant vigilance and upgradability.

The IoT Requires Upgradable Security

NDC Conferences
Add to list
0:00 / 0:00