Episode 8: Securing The World of IoT

Episode 8 September 24, 2019 00:27:26
Episode 8: Securing The World of IoT
SilverLining IL
Episode 8: Securing The World of IoT

Sep 24 2019 | 00:27:26

/

Hosted By

Moshe Ferber Ariel Munafo

Show Notes

Attendees

Guest: Beau Woods

Guest title:  Member

Company:  We-Are-The-Cavalry, Atlantic Council

Abstract

IOT devices such as Medical embedded devices, autonomous vehicle and smart homes are currently the Achilles heel of information security. The technology is advancing fast, but the security frameworks are not advancing at the same pace. In this episode we talk with Beau woods, founder for I-am-the-cavalry, about the steps governments, regulators and vendors should take in order to produce safer IOT devices.

Timing

 

0:00

Intro and introducing our Beau activities and I-AM-The-Cavalry community  

5:20

What are the unique challenges of IOT security? 

9.05 

It is not a question of connectivity

11:35  

How do better engineer IOT devices - fail fast, detect failure and maintain an ability to fix failures

17.15

Engineering is not enough - how the IOT consumers should be trained for and aware of

22.20

Summary and conclusions

 

Other Episodes

Episode 28

November 11, 2020 00:29:02
Episode Cover

Episode 28: Analyzing Cloud Attack Vectors - SaaS Marketplaces and Office 365 BEC

Attendees Guest: Ofer Maor Guest title: Co-Founder & CTO  Company: Mitiga Abstract The recent increase of cloud based attacks gives us an opportunity to...

Listen

Episode 33

January 18, 2021 00:31:24
Episode Cover

Episode 33: Researching Cloud Vulnerabilities

Attendees Guest: Asaf Hecht  Guest Title: Security research team leader Company: CyberArk  Abstract With the growth of cloud services, more knowledge is gathered on...

Listen

Episode 37

April 13, 2021 00:27:16
Episode Cover

SilverLining Episode 37: Software Package Dependencies Attacks

Attendees Guest: Tzachi Zornstain Guest Title: Co-Founder & CEO, Dustico Topic: Software Package Dependencies Attacks Abstract Supply chain and software dependencies attacks are becoming...

Listen