Io(M)T Security: A year in review
Key | Action |
---|---|
K or space | Play / Pause |
M | Mute / Unmute |
C | Select next subtitles |
A | Select next audio track |
V | Show slide in full page or toggle automatic source change |
left arrow | Seek 5s backward |
right arrow | Seek 5s forward |
shift + left arrow or J | Seek 10s backward |
shift + right arrow or L | Seek 10s forward |
control + left arrow | Seek 60s backward |
control + right arrow | Seek 60s forward |
shift + down arrow | Decrease volume |
shift + up arrow | Increase volume |
shift + coma | Decrease playback speed |
shift + dot or shift + semicolon | Increase playback speed |
end | Seek to end |
beginning | Seek to beginning |
Information on this media
Links:
Creation date:
July 4th, 2018, 2:50 p.m.Add date:
July 6th, 2018, 2:03 p.m.Number of views:
22Speaker:
Rayna StamboliyskaLicense:
CC BY-SA v4Visibility:
This media is publishedDescription
A year ago, I embarked on the funky journey to gain insights into IoT security. I am particularly interested in medical devices, that is an item that’s connected to the Internet AND can gather some sort of health data.
I started off with connected sex toys—it’s fun to tear them down, then tell others about it. Beyond the fun, though, is the actual understanding of what is at stake. And, in all honesty, your fridge, your insulin pump and your pacemaker all share the same challenges: they need improved security so that we are not at risk.
Since the first dildo I investigated, my analysis capabilities have evolved. This talk will address the diverse range of challenges I have had: obtaining the objects (the least complex one… but not the cheapest option, still!), producing reproducible data, collecting meaningful logs, having the companies building the IoT fix their flaws, etc. Thankfully, I will also discuss the solutions I identified, all of which involve FLOSS and (in part) open hardware.
Rayna Stamboliyska
Rayna is a risk management and crisis mitigation expert with a focus on IT security governance and compliance. An award-winning author for her most recent book “La face cachée d’Internet” (“The hidden face of the Internet”, published with Larousse-Hachette), Rayna has extensively explored the impact of data and technology in conflict and post-conflict zones in the MENA region and Eastern Europe. She has consulted for international organisations, private companies, governments and non-profits. Energetic and passionate, Rayna has grown to become a recognized information security speaker committed to educating those outside of the industry on security threats and best practice, and writes up the cybersecurity expert column “50 nuances d’Internet” (“50 shades of Internet”) at ZDNet.fr.
Other media in the channel "2018"
95 views, 1 this monthGlassfish from (IN)Secure adminJuly 6th, 2018
153 views, 1 this monthShadow on the Wall - Risks and Flaws with ShadowsocksJuly 6th, 2018
52 viewsOpen Hardware for (software) offensive securityJuly 6th, 2018
40 viewsFreedom Fighting Mode - Open Source Hacking HarnessJuly 6th, 2018
72 views, 1 this monthExpl-iot: IoT Security Testing FrameworkJuly 6th, 2018
41 viewsIoT Honeypot, new types of attacksJuly 6th, 2018