התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


1 Tiffany Yu — Smashing Stereotypes and Building a Disability-Inclusive World 30:23
EP 47: Hacking Smart Buildings
Manage episode 444234425 series 3469998
If you are in IT, you are probably not thinking about the risks associated with the Otis Elevator or the Coke machine. Maybe you should. Chester Wisnieski, the director and global field CTO at Sophos, points out that IoT devices, big and small, create an outsized threat to any organization. And that’s why IoT vendors need to secure these devices, even if they only “phone home” for more Coke. If they’re on your network, they need to be secured.
67 פרקים
Manage episode 444234425 series 3469998
If you are in IT, you are probably not thinking about the risks associated with the Otis Elevator or the Coke machine. Maybe you should. Chester Wisnieski, the director and global field CTO at Sophos, points out that IoT devices, big and small, create an outsized threat to any organization. And that’s why IoT vendors need to secure these devices, even if they only “phone home” for more Coke. If they’re on your network, they need to be secured.
67 פרקים
Alle episoder
×
1 EP 66: Secure only the OT code that actually runs 23:11

1 EP 65: Hacking Critical Infrastructure Through Supply Chains 30:22

1 EP 62: Defending the Unknown in OT Security 31:38

1 EP 61: Applying Zero Trust to OT systems 36:07

1 EP 60: Hacking Solar Power Inverters 39:21

1 EP 59: Automotive Hacking In Your Own Garage 36:15

1 EP 57: Strengthening Embedded Device Security with Cloud-Based SCADA 33:36

1 EP 56: Hacking OT and ICS in the Era of Cloud and Automation 42:19

1 EP 55: Building Secure Storage for Autonomous Vehicles 28:48

1 EP 54: From Cyber Chaos to Control: Lessons from a Kansas Water District 34:01

1 EP 53: Securing Smart OT Systems Already In The Field 31:17

1 EP 52: Hacking Cellular-Enabled IoT Devices 37:59

1 EP 51: Hacking High-Performance Race Cars 43:39

1 EP 50: Keeping The Lights On In Ukraine 44:07

1 EP 49: Hacking Android-Based ICS Devices 39:27

1 EP 48: The New Insider Threat: Hacking Corporate Office Devices 40:51


1 EP 46: Hacking Israeli-made Water Treatment Devices In Pennsylvania 33:34

1 EP 45: Laser Fault Injections on a Shoestring Budget 32:35

1 EP 44: Performing Security Assessments on ICS systems 34:16

1 EP 43: Hacking Large-Scale Off-Grid Solar Systems and Other Consumer IoT Devices 50:45

1 EP 41: Firmware SBOMs, Zero Trust, And IoT Truth Bombs 41:26

1 EP 40: Hacking IoT Surveillance Cameras For Espionage Operations 28:27

1 EP 39: Hacking Water Systems and the OT Skills Gap 40:20

1 EP 38: Regulating OT Data Breaches And Ransomware Reporting 42:50

1 EP 37: Solving Mysteries. Saving Lives. Just Another Day with OT Incident Response and Forensics 42:05

1 EP 36: Securing SCADA Systems In The Cloud 26:02

1 EP 35: Outsized Kinetic Response to OT Attacks 39:13

1 EP 34: Quantifying Risk in IoT and OT Systems 40:44

1 EP 33: Turning EDRs and Cloud Backups into Malicious Wipers 32:48

1 EP 32: Using ChatGPT To Perform Side Channel Attacks On Real Hardware 30:56

1 EP 31: How Operation Volt Typhoon Shows That IoT & OT Devices Could Be Used In Cyberwarfare 43:31

1 EP 30: Of IoT Vulnerabilities and Consumer IoT Labels 43:49

1 EP 29: The Rise of Smash and Grab Data Exfiltration 36:09

1 EP 28: Why Mapping IT Security to OT Networks Doesn’t Always Work 42:28

1 EP 27: Cyber Physical Security As A Shared Responsibility 35:10

1 EP 26: Securing Railroad OT Systems 42:13

1 EP 25: Crypto Agility And The End Of Diffie Hellman Key Exchange 38:51

1 EP 24: Securing OT Devices In The Field 44:04


1 EP 22: Applying Zero Trust to OT Systems 45:01
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.