Skip links
Vulnerable, Targeted, and Exploited IoT Devices: Take the Necessary Steps to Discover Assets and Remediate the Risk

Vulnerable, Targeted, and Exploited IoT Devices: Take the Necessary Steps to Discover Assets and Remediate the Risk

Video

Vulnerable, Targeted, and Exploited IoT Devices: Take the Necessary Steps to Discover Assets and Remediate the Risk

Featuring: Brian Contos, CSO, Phosphorus Cybersecurity and Sean Martin, ITSP Magazine

Large enterprises and government agencies deploy thousands of Internet of Things (IoT), Operational Technology (OT), and other network-connected devices. But many severely underestimate the count, and many more do not manage these devices to ensure the latest security measures are in place. This includes up-to-date firmware and strong passwords. Knowing this, the cybercriminal community focuses on these devices and environments. They are more vulnerable than primary IT infrastructures and offer an easy way to breach digital assets and move laterally without discovery across an organization’s broader infrastructure.

In this interview, Brian Contos, Chief Security Officer for Phosphorous Cybersecurity, presents insights and examines the risks to IoT, OT, and network devices and the issues they can cause to an organization’s overall IT infrastructure. The interview also demonstrates how devices are attacked and presents ways to overcome the risks to ensure digital assets remain safe.

Sign-up for the Blue Lava Community and join the discussion already taking place with Brian and other community members – https://community.bluelava.io

 

 

About the Crucial Conversations Series

The business of security is not easy, luckily, we don’t have to do it alone. Welcome to the Crucial Conversations videocast with the Blue Lava Community — where expert insights on real-world Security Program Management are delivered with, by, and for the most respected security leaders around the world.

Drawing from the battle-tested experiences of the security industry’s most respected executives, the Crucial Conversations Podcast provides listeners with expert insights and advice, featuring the founding members and facilitators of the Blue Lava Community. Get ready to examine and discuss possible solutions to the most pressing business challenges unique to the careers of CISOs and cybersecurity executives.

Watch, learn, and engage with featured guests in the Crucial Conversations series, and join the conversation that’s taking place 365-days a year exclusively in the Blue Lava Community online portal.