PLAY PODCASTS
Vulnerable, Targeted, And Exploited IoT Devices: Take The Necessary Steps To Discover Assets And Remediate The Risk | A Crucial Conversation With Brian Contos
Episode 1146

Vulnerable, Targeted, And Exploited IoT Devices: Take The Necessary Steps To Discover Assets And Remediate The Risk | A Crucial Conversation With Brian Contos

Large enterprises and government agencies deploy thousands of Internet of Things (IoT), Operational Technology (OT), and other network-connected devices. But many severely underestimate the count, and many more do not manage these devices to ensure the latest security measure are in place.

The ITSPmagazine Podcast · ITSPmagazine Crucial Conversations, Sean Martin, Brian Contos

September 14, 202250m 47s

Audio is streamed directly from the publisher (chtbl.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

Large enterprises and government agencies deploy thousands of Internet of Things (IoT), Operational Technology (OT), and other network-connected devices. But many severely underestimate the count, and many more do not manage these devices to ensure the latest security measure are in place.

This includes up-to-date firmware and strong passwords. Knowing this, the cybercriminal community focuses on these devices and environments. They are more vulnerable than primary IT infrastructures and offer an easy way to breach digital assets and move laterally without discovery across an organization’s broader infrastructure.

In this episode, Brian Contos, Chief Security Officer for Phosphorous Cybersecurity, presents insights and examines the risks to IoT, OT, and network devices and the issues they can cause to an organization's overall IT infrastructure. The article also demonstrates how devices are attacked and presents ways to overcome the risks to ensure digital assets remain safe.

_______________________

Community Member Contributor: Brian Contos
Chief Security Officer for Phosphorous Cybersecurity [@phosphorusinc]
On Twitter | https://twitter.com/BrianContos
On LinkedIn | https://www.linkedin.com/in/briancontos/

Host: Sean Martin
On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin

______________________

For more podcasts from Crucial Conversations with The Blue Lava Community, visit: https://www.itspmagazine.com/crucial-conversations-podcast

To access the full collection of Blue Lava Community resources, visit: https://itspm.ag/blclog22

To learn more about Blue Lava, visit: https://itspm.ag/blue-lava-w2qs

______________________

Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network


Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Topics

chief security officersecurity managementcootechnologybrian contoscisosecurity programinfosecnetworkcybersecuritybusinessrisk managementinnovationsecurity officerchief information security officercomputersinformation securityctoicsiotprivacycommunityceocrucial conversationssecurity operations