There have been a lot of problems with IoT from the outset. A marketing catch-all term, the truth about IoT is that many of these devices have been connected for years and it’s only now that attention is being paid to them by both security researchers and the bad guys. There are whole set of new devices coming to market which incredibly harbour some of the same issues as very old devices, making them very dangerous from a security perspective. Attack techniques have moved on significantly meaning that leaving old vulnerabilities around can be catastrophic. We’ve devised a training course dedicated to helping you understand these risks.
IoT is unique in that it is being adopted by nearly every different product and service sector, right across the world. The fast-paced implementation of these solutions is leading to some pretty bad decisions across the technology ecosystem. From internet-connected toys to connected fish tanks, bad configuration, insecure hardware and basic software design errors have created a toxic view of the security of IoT and the products on sale. The scary thing is that in fact we do know how to fix these problems and in a lot of cases the technology and methodologies are out there to address them, we just need to actually do it and do it properly – a secure by default approach to IoT security.
Do something now
The ship has already sailed on whether it’s appropriate or not to put security in a product – you have to do it or your product and company will ultimately fail. The time to act is now – get you and your staff skilled up and ensure that your company and products are actually fit for purpose in the IoT age. We’ve teamed up with the IoT Security Foundation to provide an Introduction to IoT Security, with no pre-requisites. Suitable for all levels, sign-up here and help make the world a bit more secure!
So what are the benefits of coming on the Introduction to IoT Security course?
You’ll understand the basics of what you need to do about your devices – right from the hardware up the technology stack to ensuring that you’re communicating securely and that the other components such as mobile applications and cloud services are being secured properly too.
We’ll share with you cutting edge knowledge from the frontline of IoT developments and we have our own first-hand experience to impart. As well as teaching you how best to secure your products and services, you’ll get some hands-on exposure to well-known IoT hacking techniques, giving you an experience of the attacker’s point of view. We’ll also show you how to implement a vulnerability disclosure policy, monitor your product security and how to get your products and services ready for certification through the IoT Security Foundation.