YoVDO

The Internet of Us

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Internet of Things Courses Bug Bounty Courses Security Models Courses Vulnerability Management Courses Zero Trust Security Courses

Course Description

Overview

Explore the evolving landscape of Internet of Things (IoT) security in this thought-provoking keynote presentation from the 44CON Information Security Conference. Delve into the misconceptions surrounding IoT, examining how it represents the next wave of computing rather than just a trend. Discover why focusing solely on hacking potential misses the bigger picture of technological advancement. Learn about the blurring boundaries between endpoints and cloud services, and understand the shifting risk landscape where businesses face greater threats than consumers. Gain insights into new security models that have been overlooked and explore cost-effective strategies to combat emerging challenges. Reflect on the industry's role in supporting technological evolution and the importance of adapting security principles to new paradigms. Leave with a renewed commitment to information security and a fresh perspective on IoT as "The Internet of Us."

Syllabus

Intro
We dont communicate
Bug Fetishing
Bluetooth Vulnerability
Is it new
Sexual nature of bugs
The giant press
The small issues
Cost
Cost of doing business
Wearable technology
Zero trust
Vulnerability
Bug bounties
No more nuclear weapons
The information security industry is dying
Charles Bukowski poem


Taught by

44CON Information Security Conference

Related Courses

Ethical Hacking 101: Web App Penetration Testing - a full course for beginners
freeCodeCamp
Web Application Ethical Hacking - Penetration Testing Course for Beginners
freeCodeCamp
Bug Bounty Hunter Job Role Path
HTB Academy via Independent
BugBountyHunter
BugBountyHunter via Independent
Hacker101
HackerOne via Independent