Skip to content

Think Like the Hackers: Protecting our IOT Systems | Intel Business

Play Video

How do I protect my organization when I have so much connectivity? How does the Internet of Things play a role?

In this Cyber Security Inside video, Tom and Camille have a conversation with Malcolm Harkins, Chief Security & Trust Officer at Epiphany Systems, and Rob Bathurst, Co-Founder & Chief Technology Officer at Epiphany Systems about the Internet of Things and thinking like attackers to protect systems. 

You’ll learn: 

  • How the systems in a building physically can be a vulnerability in an organization’s systems.
  • How thinking like an adversary and what their goals might be is the key to protecting your systems the best you can.
  • How complex Internet of Things systems are, and ideas on how to protect them.
  • The difference between vulnerability and exploitability, and how to look at both.
  • And more!

Check it out. For more information, previous podcasts, and full versions, visit our website at https://cybersecurityinside.com  

#InternetOfThings #vulnerabilities #hacking

—–

If you are interested in emerging threats, new technologies, or best tips and practices in cybersecurity, please follow the Cyber Security Inside podcast on your favorite podcast platforms.

 

Apple Podcast: https://podcasts.apple.com/us/podcast/cyber-security-inside-podcast/id1526572021 

Spotify: https://open.spotify.com/show/6RN4ATo5ZDGvgaEj8rLep7?si=EQyu5_A0RvaEDGMdmiiRug 

 

Follow our hosts Tom Garrison and Camille Morhardt:

Tom: @tommgarrison

Camille: @morhardt

 

Learn more about Intel Cybersecurity:

https://www.intel.com/content/www/us/en/security/overview.html 

Intel Compute Life Cycle (CLA):

https://www.intel.com/content/www/us/en/security/compute-lifecycle-assurance.html