What You Need to Know Before
You Start

Starts 8 June 2025 07:14

Ends 8 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in Home Appliances

Explore a manufacturer's strategy to protect home appliances from IoT malware post-shipment, addressing rapid attack cycles and complex malware capabilities based on 5 years of IoT threat intelligence.
Black Hat via YouTube

Black Hat

2544 Courses


23 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore a manufacturer's strategy to protect home appliances from IoT malware post-shipment, addressing rapid attack cycles and complex malware capabilities based on 5 years of IoT threat intelligence.

Syllabus

  • Introduction to IoT Malware
  • Overview of IoT devices in home appliances
    Common IoT malware threats and trends
    The importance of post-shipment security
  • IoT Threat Intelligence
  • Collection and analysis of IoT threat data
    Understanding rapid attack cycles in IoT devices
    Five-year trends in IoT malware capabilities
  • Post-Shipment Security Strategies
  • Firmware and software update mechanisms
    Network segmentation and firewall configurations
    Secure boot and hardware root of trust
  • Real-time Monitoring and Detection
  • Implementing anomaly detection systems
    Continuous monitoring techniques for IoT devices
  • Response and Mitigation Techniques
  • Incident response planning and execution
    Quarantine and rehabilitation of infected devices
  • Collaboration and Information Sharing
  • Partnering with cybersecurity firms
    Sharing threat intelligence with industry consortia
  • Case Studies
  • Analysis of notable IoT malware incidents and responses
    Lessons learned from successful defense strategies
  • Future Challenges and Emerging Trends
  • The evolution of IoT malware tactics
    Preparing for new vulnerabilities in upcoming technologies
  • Course Wrap-Up
  • Summary of key takeaways
    Open discussion on IoT security innovations

Subjects

Conference Talks