Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
AI, Data Science & Cloud Certificates from Google, IBM & Meta
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the critical importance of threat modeling for IoT systems in this 49-minute LASCON conference talk. Delve into the challenges and risks associated with the proliferation of IoT devices, which expose unprecedented amounts of personal sensitive data. Learn how to apply threat modeling techniques to IoT systems, helping to build more secure designs and effectively test system security. Discover the components of IoT systems, including supporting web services and client applications, and understand how to identify trust boundaries and data flow paths. Gain insights into IoT security concerns for consumers, enterprises, and developers, and examine specific use cases involving safety concerns, such as in medical devices. Acquire valuable knowledge on threat modeling materials and methodologies to enhance the security of IoT systems during both the design and testing phases.
Syllabus
Introduction
Background
Storytime
Agenda
IoT Overview
IoT Security
Consumers
Enterprise Industry
Developers
Why
Mobile
IoT
Mobile Assessments
Threat Modeling
Use Cases
Safety Concerns
Maximum Overdrive
Medical Devices
Additional Threat Modeling Materials
Closing Thoughts
Taught by
LASCON