Artwork

Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

Uncovering the Risks of Nation State xIoT Hacking with Bill Crowell

43:25
 
공유
 

Manage episode 352236730 series 3418676
Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Discover how former Deputy Director at the NSA Bill Crowell envisions the present and future of xIoT in this exclusive interview!

"An attacker focuses on whatever is left unprotected. And if there's not a lot of attention being given to xIoT or IoT or OT, then that's where the attacker is going to go." - Bill Crowell

Bill Crowell is a cybersecurity luminary and former National Security Agency executive with 34 years of experience in the field. He has held a variety of positions in the public and private sectors, from designing satellites to serving as the head of an intelligence organization focused on the Soviet Union during the Cold War.

During Bill Crowell's years at the National Security Agency, he was involved in the intelligence-gathering systems for the military. He also co-authored a book in 2007 predicting the convergence of physical and logical security. In the current landscape, business leaders do not understand cyber-attacks and IoT threats, making them vulnerable targets. Nation-states such as Russia, China, Iran, and North Korea are taking advantage of these vulnerabilities by focusing their attacks on xIoT devices. For example, they are using the devices to hide and exfiltrate sensitive data.

In this episode, you will learn the following:
1. How the framework of cybersecurity has evolved over the years and what impact this has had on society.
2. How nation-states are utilizing xIoT devices as a major attack vector.
3. How attackers are using xIoT devices as an entry point to gain access to sensitive data and exfiltrate it.


Let’s connect about IoT Security!

Follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

32 에피소드

Artwork
icon공유
 
Manage episode 352236730 series 3418676
Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Discover how former Deputy Director at the NSA Bill Crowell envisions the present and future of xIoT in this exclusive interview!

"An attacker focuses on whatever is left unprotected. And if there's not a lot of attention being given to xIoT or IoT or OT, then that's where the attacker is going to go." - Bill Crowell

Bill Crowell is a cybersecurity luminary and former National Security Agency executive with 34 years of experience in the field. He has held a variety of positions in the public and private sectors, from designing satellites to serving as the head of an intelligence organization focused on the Soviet Union during the Cold War.

During Bill Crowell's years at the National Security Agency, he was involved in the intelligence-gathering systems for the military. He also co-authored a book in 2007 predicting the convergence of physical and logical security. In the current landscape, business leaders do not understand cyber-attacks and IoT threats, making them vulnerable targets. Nation-states such as Russia, China, Iran, and North Korea are taking advantage of these vulnerabilities by focusing their attacks on xIoT devices. For example, they are using the devices to hide and exfiltrate sensitive data.

In this episode, you will learn the following:
1. How the framework of cybersecurity has evolved over the years and what impact this has had on society.
2. How nation-states are utilizing xIoT devices as a major attack vector.
3. How attackers are using xIoT devices as an entry point to gain access to sensitive data and exfiltrate it.


Let’s connect about IoT Security!

Follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

32 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드