Exfiltrating Data through IoT
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=cHIyas6BiEs
Chet Hosmer, Founder, Python Forensics • Michael Raggo, CSO, 802 Secure, Inc. • IoT offers a plethora of new protocols and frequencies over which communication travels. Protocols and services such as SSDP, P25, Zigbee, Z-Wave, WiFi and more provide countless ways to exfiltrate data or infiltrate the network. Through real-world examples, sample code and demos, presenters will bring to light these threats and new methods for detecting aberrant behavior emanating to/from these devices. • Learning Objectives: • 1: Gain a better understanding of the many IoT protocols, frequencies and services. • 2: Learn how IoT communications can be exploited to exfiltrate your network. • 3: Obtain a list of techniques for detecting these aberrant IoT behaviors. • https://www.rsaconference.com/videos/...
#############################
