YoVDO

Threat Modeling for IoT Systems

Offered By: LASCON via YouTube

Tags

LASCON Courses IoT security Courses Threat Modeling Courses

Course Description

Overview

Explore the critical importance of threat modeling for IoT systems in this 49-minute LASCON conference talk. Delve into the challenges and risks associated with the proliferation of IoT devices, which expose unprecedented amounts of personal sensitive data. Learn how to apply threat modeling techniques to IoT systems, helping to build more secure designs and effectively test system security. Discover the components of IoT systems, including supporting web services and client applications, and understand how to identify trust boundaries and data flow paths. Gain insights into IoT security concerns for consumers, enterprises, and developers, and examine specific use cases involving safety concerns, such as in medical devices. Acquire valuable knowledge on threat modeling materials and methodologies to enhance the security of IoT systems during both the design and testing phases.

Syllabus

Introduction
Background
Storytime
Agenda
IoT Overview
IoT Security
Consumers
Enterprise Industry
Developers
Why
Mobile
IoT
Mobile Assessments
Threat Modeling
Use Cases
Safety Concerns
Maximum Overdrive
Medical Devices
Additional Threat Modeling Materials
Closing Thoughts


Taught by

LASCON

Related Courses

Comparing WAF and RASP - Why?
LASCON via YouTube
API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube
Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube
Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube
Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube