How do I protect my organization when I have so much connectivity? How does the Internet of Things play a role?
In this Cyber Security Inside video, Tom and Camille have a conversation with Malcolm Harkins, Chief Security & Trust Officer at Epiphany Systems, and Rob Bathurst, Co-Founder & Chief Technology Officer at Epiphany Systems about the Internet of Things and thinking like attackers to protect systems.
You’ll learn:
- How the systems in a building physically can be a vulnerability in an organization’s systems.
- How thinking like an adversary and what their goals might be is the key to protecting your systems the best you can.
- How complex Internet of Things systems are, and ideas on how to protect them.
- The difference between vulnerability and exploitability, and how to look at both.
- And more!
Check it out. For more information, previous podcasts, and full versions, visit our website at https://intechnology.intel.com
#InternetOfThings #vulnerabilities #hacking
—–
If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.
Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021
Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug
Follow our hosts Tom Garrison and Camille Morhardt:
Tom: @tommgarrison
Camille: @morhardt
Learn more about Intel Cybersecurity:
https://www.intel.com/content/www/us/en/security/overview.html
Intel Compute Life Cycle (CLA):
https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html