Abstract
Introduction to IoT
Present Vulnerabilities Research and attacks on IoT
Why its happening?
Top View of Key components in IoT
Mapping attack surface areas
Possible Security vulnerabilities in each key component
Quick walk through of available IoT Security Testing and secure development guides
Speaker
Security Researcher, Bangalore
Timing
Starts at Saturday April 22 2017, 12:00 PM. The sessions runs for about 1 hour.