Expert Interview: Would You Like to Hear the Story of the Connected Teddy Bear, ICS, and the IoT?

EXPERT INTERVIEW: Recorded on March 15, 2017

A few take-aways from the discussion:

  • Some of the attendees bring their personal IoT devices to work with them
  • Hardware and software re-use is dangerous
  • Hardware issues can't be patched
 

How Many IoT Devices Do You Have?

Do you use IoT Devices at Work?

 

Which is More Secure?

How Many IoT Protocols Are There?

 

FEATURED EXPERT
Jamison Utter, VP Field Operations, Senrio

YOUR HOST
Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine

 

Jamison Utter, VP Field Operations, Senrio

 

Sean Martin, Editor-in-Chief, ITSPmagazine

 

Jamison Utter and Sean Martin will have a 1:1 discussion about what the Internet of Things actually is. We’ll be talking about way more than the consumer gizmos and gadgets people get for their birthday… we’ll be looking at some of the electronics that power our new world. We’ll also explore what it means to society if/when these devices are exploited - including the wide impact an attack can have on the large industrial supply chain. Time permitting, we’ll also go a little deeper into the dark web to see how these devices are being used beyond simple DDoS attacks, spying, and of course, ransom.

By joining us for this conversation, attendees will gain:

1. An understanding an appreciation for all sorts of connected devices - consumer and industrial alike, including the infamous connected teddy bear

2. A view into the risks and attacks associated with these connected devices - and the impact an exploit can have on society

3. A sense for the business drivers behind building these devices, connecting them to the Internet, and the need to properly define and employ information security practices to the end-to-end supply chain


HERE'S AN ANSWER TO A QUESTION RAISED DURING THE WEBINAR FOR WHICH WE WERE UNABLE TO ADDRESS DURING THE LIVE SESSION

Question: How do you see the closed loop connectivity of SigFox or LORA affecting the devices in the wild?

Senrio Research Team: Devices have been online for a long time. While there might be opportunities to both harden tech and exploit it more broadly as vendors start relying on common standards more than one-off protocols, there are also plenty of devices already that have direct internet connections, intentionally or not. If additional detail is required, our team is happy to do a deeper review with anyone interested.