IoT Security: Hardening Services Over Connected Devices

IoT Security: Hardening Services Over Connected Devices

April 12, 2018, 11:00 AM - 12:00 PM

Sands 304 Level 1


When building IoT devices, there are numerous owners of the hardware, firmware, drivers, and other code in the stack. Security flaws can happen in any of these areas, which makes supply chain management and identity important in the security of IoT devices. Who can update these devices? Can rogue firmware be loaded without authorization? This talk will cover the security of the hardware, firmware, and software including current attacks being seen in the wild, what device manufacturers should be doing, and how to reduce these attacks. While nothing will ever completely stop these attacks, there are ways to limit the exposure of attacks, and immediately revoke compromised devices ability to communicate with other devices. This talk will also cover other types of solutions to show why they don’t cover what device manufacturers and site mangers really should be concerned with.

Learning Objectives:
1. Identify the types of IoT devices involved in physical security for consumer, and enterprise environments.
2. Articulate the common security issues and design flaws that have affected IoT devices.
3. Differentiate between the various approaches to security from IoT platform vendors and how those impact the security of the devices.


  • Brian Knopf


    Sr Director of Security Research


    Brian Knopf is a security researcher who created an identity management product for IoT, that was acquired by Neustar. He is now the Sr Director of...


  1. Show SIA Education@ISC


  1. Track
    Connected Security Technology

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.