What You Need to Know Before
You Start

Starts 30 June 2025 07:17

Ends 30 June 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in Home Appliances

Join us in exploring a cutting-edge approach by manufacturers to enhance the security of home appliances against IoT malware after they have been shipped. This information-rich session delves into strategies informed by five years of detailed IoT threat intelligence, designed to address the quick evolution of attack cycles and the increasing.
Black Hat via YouTube

Black Hat

2765 Courses


23 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Join us in exploring a cutting-edge approach by manufacturers to enhance the security of home appliances against IoT malware after they have been shipped. This information-rich session delves into strategies informed by five years of detailed IoT threat intelligence, designed to address the quick evolution of attack cycles and the increasing complexity of malware targeting IoT devices.

Presented by YouTube, this insightful content falls under the categories of Artificial Intelligence Courses and Conference Talks, making it essential viewing for anyone interested in the intersection of cyber security and advanced appliance manufacturing.

Syllabus

  • Introduction to IoT Malware
  • Overview of IoT devices in home appliances
    Common IoT malware threats and trends
    The importance of post-shipment security
  • IoT Threat Intelligence
  • Collection and analysis of IoT threat data
    Understanding rapid attack cycles in IoT devices
    Five-year trends in IoT malware capabilities
  • Post-Shipment Security Strategies
  • Firmware and software update mechanisms
    Network segmentation and firewall configurations
    Secure boot and hardware root of trust
  • Real-time Monitoring and Detection
  • Implementing anomaly detection systems
    Continuous monitoring techniques for IoT devices
  • Response and Mitigation Techniques
  • Incident response planning and execution
    Quarantine and rehabilitation of infected devices
  • Collaboration and Information Sharing
  • Partnering with cybersecurity firms
    Sharing threat intelligence with industry consortia
  • Case Studies
  • Analysis of notable IoT malware incidents and responses
    Lessons learned from successful defense strategies
  • Future Challenges and Emerging Trends
  • The evolution of IoT malware tactics
    Preparing for new vulnerabilities in upcoming technologies
  • Course Wrap-Up
  • Summary of key takeaways
    Open discussion on IoT security innovations

Subjects

Conference Talks