What You Need to Know Before
You Start
Starts 8 June 2025 07:14
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in Home Appliances
Explore a manufacturer's strategy to protect home appliances from IoT malware post-shipment, addressing rapid attack cycles and complex malware capabilities based on 5 years of IoT threat intelligence.
Black Hat
via YouTube
Black Hat
2544 Courses
23 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore a manufacturer's strategy to protect home appliances from IoT malware post-shipment, addressing rapid attack cycles and complex malware capabilities based on 5 years of IoT threat intelligence.
Syllabus
- Introduction to IoT Malware
- IoT Threat Intelligence
- Post-Shipment Security Strategies
- Real-time Monitoring and Detection
- Response and Mitigation Techniques
- Collaboration and Information Sharing
- Case Studies
- Future Challenges and Emerging Trends
- Course Wrap-Up
Overview of IoT devices in home appliances
Common IoT malware threats and trends
The importance of post-shipment security
Collection and analysis of IoT threat data
Understanding rapid attack cycles in IoT devices
Five-year trends in IoT malware capabilities
Firmware and software update mechanisms
Network segmentation and firewall configurations
Secure boot and hardware root of trust
Implementing anomaly detection systems
Continuous monitoring techniques for IoT devices
Incident response planning and execution
Quarantine and rehabilitation of infected devices
Partnering with cybersecurity firms
Sharing threat intelligence with industry consortia
Analysis of notable IoT malware incidents and responses
Lessons learned from successful defense strategies
The evolution of IoT malware tactics
Preparing for new vulnerabilities in upcoming technologies
Summary of key takeaways
Open discussion on IoT security innovations
Subjects
Conference Talks