The Internet of Things: Vulns, Botnets and Detection

Does the ‘internet of things’ scare you? It probably should. We’re going to be discussing why embedded device security is laughably bad, handling vendor notification, and setting up a dev environment to build embedded software. In addition, we will be dissecting an incident response of Carna, and defensive techniques for protecting embedded devices.

Presented by