YoVDO

The Internet of Us

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Internet of Things Courses Bug Bounty Courses Security Models Courses Vulnerability Management Courses Zero Trust Security Courses

Course Description

Overview

Explore the evolving landscape of Internet of Things (IoT) security in this thought-provoking keynote presentation from the 44CON Information Security Conference. Delve into the misconceptions surrounding IoT, examining how it represents the next wave of computing rather than just a trend. Discover why focusing solely on hacking potential misses the bigger picture of technological advancement. Learn about the blurring boundaries between endpoints and cloud services, and understand the shifting risk landscape where businesses face greater threats than consumers. Gain insights into new security models that have been overlooked and explore cost-effective strategies to combat emerging challenges. Reflect on the industry's role in supporting technological evolution and the importance of adapting security principles to new paradigms. Leave with a renewed commitment to information security and a fresh perspective on IoT as "The Internet of Us."

Syllabus

Intro
We dont communicate
Bug Fetishing
Bluetooth Vulnerability
Is it new
Sexual nature of bugs
The giant press
The small issues
Cost
Cost of doing business
Wearable technology
Zero trust
Vulnerability
Bug bounties
No more nuclear weapons
The information security industry is dying
Charles Bukowski poem


Taught by

44CON Information Security Conference

Related Courses

Palo Alto Networks Security Operations Fundamentals
Palo Alto Networks via Coursera
AZ-500: Manage Identity and Access
Microsoft via Microsoft Learn
Zero Trust Security
Udacity
Microsoft 365 Fundamentals (MS-900) Cert Prep: 3 Security, Compliance, and Trust in Microsoft 365
LinkedIn Learning
ゼロトラストセキュリティ
Udemy