Io(M)T Security: A year in review
Action | Key |
---|---|
Play / Pause | K or space |
Mute / Unmute | M |
Toggle fullscreen mode | F |
Select next subtitles | C |
Select next audio track | A |
Show slide in full page or toggle automatic source change | V |
Seek 5s backward | left arrow |
Seek 5s forward | right arrow |
Seek 10s backward | shift + left arrow or J |
Seek 10s forward | shift + right arrow or L |
Seek 60s backward | control + left arrow |
Seek 60s forward | control + right arrow |
Decrease volume | shift + down arrow |
Increase volume | shift + up arrow |
Decrease playback rate | < |
Increase playback rate | > |
Seek to end | end |
Seek to beginning | beginning |
Share this media
Download links
HLS video stream
You can use an external player to play this stream (like VLC).
HLS video streamWhen subscribed to notifications, an email will be sent to you for all added annotations.
Your user account has no email address.
Information on this media
A year ago, I embarked on the funky journey to gain insights into IoT security. I am particularly interested in medical devices, that is an item that’s connected to the Internet AND can gather some sort of health data.
I started off with connected sex toys—it’s fun to tear them down, then tell others about it. Beyond the fun, though, is the actual understanding of what is at stake. And, in all honesty, your fridge, your insulin pump and your pacemaker all share the same challenges: they need improved security so that we are not at risk.
Since the first dildo I investigated, my analysis capabilities have evolved. This talk will address the diverse range of challenges I have had: obtaining the objects (the least complex one… but not the cheapest option, still!), producing reproducible data, collecting meaningful logs, having the companies building the IoT fix their flaws, etc. Thankfully, I will also discuss the solutions I identified, all of which involve FLOSS and (in part) open hardware.
Rayna Stamboliyska
Rayna is a risk management and crisis mitigation expert with a focus on IT security governance and compliance. An award-winning author for her most recent book “La face cachée d’Internet” (“The hidden face of the Internet”, published with Larousse-Hachette), Rayna has extensively explored the impact of data and technology in conflict and post-conflict zones in the MENA region and Eastern Europe. She has consulted for international organisations, private companies, governments and non-profits. Energetic and passionate, Rayna has grown to become a recognized information security speaker committed to educating those outside of the industry on security threats and best practice, and writes up the cybersecurity expert column “50 nuances d’Internet” (“50 shades of Internet”) at ZDNet.fr.
Other media in the channel "2018"
- 115 views, 6 this year, 1 this monthGlassfish from (IN)Secure adminJuly 6th, 2018
- 161 views, 2 this yearShadow on the Wall - Risks and Flaws with ShadowsocksJuly 6th, 2018
- 57 views, 1 this yearOpen Hardware for (software) offensive securityJuly 6th, 2018
- 48 viewsFreedom Fighting Mode - Open Source Hacking HarnessJuly 6th, 2018
- 79 views, 3 this year, 1 this monthExpl-iot: IoT Security Testing FrameworkJuly 6th, 2018
- 46 views, 1 this yearIoT Honeypot, new types of attacksJuly 6th, 2018