Building Trust and Enabling Innovation for Voice Enabled IoT
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the opportunities and risks of voice-enabled IoT technology in this Black Hat conference talk. Delve into the Voice Privacy Alliance's 39 Agile security stories, designed to help product owners and developers integrate security measures into voice-enabled products. Learn how these practical tools can save time, money, and mitigate incidents and reputation damage. Discover the importance of building trust in voice-enabled devices and understand key security considerations, including voice authentication. Gain insights into real-world examples like Hello Barbie and learn how to promote innovation while ensuring privacy and security in voice-enabled IoT products.
Syllabus
Introduction
Voice enabled devices
The opportunity
Risk
Trust
Voice Privacy Alliance
Voice Privacy Toolkit
Hello Barbie
Security Considerations
Voice Authentication
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube