Community Platform
  • Analytics
  • Digital innovation
  • JavaScript
  • Structured Query Language (SQL)
  • more...
This Year
50 Points
1051 Points
MIS Badge

Click here
to validate the recipient

Emerging Technology, Emerging Threats: The Cybersecurity of Internet of Things (IoT)

The main speaker for this webinar was John Livingston who is the CEO of Verve and worked 20+ years at McKinsey & Co. This online webinar happened on Zoom on February 16th, 2022 from 5:30 PM to 6:30 PM. The name of the sponsoring organization is \\\”Women in Cybersecurity – Delaware Valley Affiliate\\\”.

I learned that the \\\”Internet of things\\\” or \\\”IoT\\\” describes physical objects that connect and exchange data with other devices and systems over the Internet or other communications networks.

Some examples of IoT devices on the consumer side of things are Alexa, Google Home, smart watches, and Apple AirTags.

Some examples of IoT threats that I learned about are:

  1. Distributed Denial of Service(DDoS)
  2. Data Manipulation and Privacy Leakage Risk
  3. Data manipulation and Disruptive Action
  4. Third Party Access and Control

An example of a specific IoT threat is GPS jamming or spoofing.

Key IoT defense principles

  1. Do not reinvent the wheel… leverage core fundamentals of IT security
  2. Start with the foundation of visibility and inventory
  3. Foundation begins with supply chain…implications for manufacturers
  4. Integrate defenses…will need to look closely at mitigating/compensating controls rather than direct defense
  5. Think Global: Act Local (getting IoT data back centrally, understand process of IoT device, should be remediated locally by people who understand the process of the device)

Another thing I learned is that you cannot scan IoT devices with traditional IT security tools given physical risks.

This activity relates to my coursework and career goals. It relates to coursework in that some of the content I\\\’m learning in my classes now are inter-related to concepts discussed in this webinar. For example, I am learning about encryption in one of my classes and ways to defend against IoT attacks are discussed in this meeting. Encryption can be seen as a way to defend against cyber attacks. This relates to my career goals in that I am an MIS major and am interested in working in the Information Technology field in the future. The contents of this webinar relate to the Information Technology field.

Skip to toolbar