In this episode, we continue our journey to RSAC 2020 APJ by looking at the expansion and growth of connected devices used to run businesses of all sizes across nearly every industry.

Bringing two perspectives together from two separate presentations our guests help us to realize that you can have as many rules of conduct that you want - they may help - but are they a panacea?

Here are the presentations‘ abstract:

Joseph Carson
‘This session will explain how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security and how a light bulb almost stopped Christmas from happening.‘

Arthur Fontaine
“IoT creates new risk exposures for enterprises. With the increasing sophistication of attacks and as devices multiply, IoT risk is unavoidable. To avoid risk is to avoid progress! Following threat modeling of a typical IoT solution architecture, this talk will offer techniques based on emerging standards, open-source IoT projects, and industry best practices to mitigate IoT threats and manage risk.“

Truth is that there are no rules of engagement — unless you understand your enemy. Standards may be used to "set the table for when dinner is served" - but what happens when the food fight begins?

As Arthur's session clearly points out, to avoid risk is to avoid progress.

Guest(s)
Joseph Carson | Arthur Fontaine

This Episode’s Sponsors:

Cequence: itspm.ag/itspcequweb

Semperis: itspm.ag/itspsempweb

To see and hear more event coverage content on ITSPmagazine, visit:
https://www.itspmagazine.com/itspmagazine-event-coverage

Are you interested in sponsoring our event coverage or another ITSPmagazine Channel?
https://www.itspmagazine.com/podcast-series-sponsorships