YoVDO

How Do You Secure What You Don't Control

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Device Security Courses Bluetooth Courses IoT security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore strategies for securing devices and systems beyond your direct control in this 24-minute conference talk from GrrCon 2016. Delve into the challenges of BYOD policies, IoT security, and emerging technologies like insulin pumps. Learn about the five stages of securing uncontrolled devices, from denial to acceptance, and understand the importance of awareness in cybersecurity. Examine real-world examples, including the Security Pledge and Airspace In, to gain insights into effective security measures for Bluetooth, ZigBee, and other interconnected technologies.

Syllabus

Introduction
How do you secure what you dont control
About Dimitri
Pony Express
Assess
The 5 Stages
Phase 1 of BYOD Denial
Phase 2 of BYOD Denial
Awareness of Security
Insulin Pumps
IoT Devices
The Reality
The Security Pledge
The Airspace In
IOT Security
Bluetooth and ZigBee
In the thick


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube