Name
IoT as a Target
Date & Time
Monday, September 12, 2022, 1:35 PM
Bri Rolston
Description

Compression of functionality defined in the Purdue Model changes the value of IoT endpoint devices to attackers as well as how they are leveraged in attacks.  How do IoT devices change the attack surface exposure of a target network?  What needs to be considered for secure architecture, incident response, or threat detection?