This webinar will examine the associated attack surface, inherent systemic vulnerabilities, and known exploitation techniques targeting embedded systems and their local or cloud-based infrastructures.
It will also explain all the steps in the embedded system kill chain from open source intelligence gathering, attack surface analysis, and the identification of vulnerabilities for exploitation.
Oct 16, 2018 2:00pm ET / 11:00am PT
Presenter: Robert Portvliet, Cylance Technical Fellow
REGISTER HERE
Attendees will learn how the design and implementation of these systems can be better hardened to protect against complex threats targeting modern embedded Internet-of-things (IoT) systems.