Vulnerable, Targeted, And Exploited IoT Devices: Take The Necessary Steps To Discover Assets And Remediate The Risk | A Crucial Conversation With Brian Contos

EPISODE · Sep 14, 2022 · 50 MIN

Vulnerable, Targeted, And Exploited IoT Devices: Take The Necessary Steps To Discover Assets And Remediate The Risk | A Crucial Conversation With Brian Contos

from Redefining CyberSecurity · host Sean Martin, ITSPmagazine, Crucial Conversations, Brian Contos

Large enterprises and government agencies deploy thousands of Internet of Things (IoT), Operational Technology (OT), and other network-connected devices. But many severely underestimate the count, and many more do not manage these devices to ensure the latest security measure are in place.This includes up-to-date firmware and strong passwords. Knowing this, the cybercriminal community focuses on these devices and environments. They are more vulnerable than primary IT infrastructures and offer an easy way to breach digital assets and move laterally without discovery across an organization’s broader infrastructure.In this episode, Brian Contos, Chief Security Officer for Phosphorous Cybersecurity, presents insights and examines the risks to IoT, OT, and network devices and the issues they can cause to an organization's overall IT infrastructure. The article also demonstrates how devices are attacked and presents ways to overcome the risks to ensure digital assets remain safe._______________________Community Member Contributor: Brian ContosChief Security Officer for Phosphorous Cybersecurity [@phosphorusinc]On Twitter | https://twitter.com/BrianContosOn LinkedIn | https://www.linkedin.com/in/briancontos/Host: Sean MartinOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin______________________For more podcasts from Crucial Conversations with The Blue Lava Community, visit: https://www.itspmagazine.com/crucial-conversations-podcastTo access the full collection of Blue Lava Community resources, visit: https://itspm.ag/blclog22To learn more about Blue Lava, visit: https://itspm.ag/blue-lava-w2qs______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

NOW PLAYING

Vulnerable, Targeted, And Exploited IoT Devices: Take The Necessary Steps To Discover Assets And Remediate The Risk | A Crucial Conversation With Brian Contos

0:00 50:47

No transcript for this episode yet

We transcribe on demand. Request one and we'll notify you when it's ready — usually under 10 minutes.

Darknet Discussions Darknet Discussions Welcome to "Darknet Discussions," the podcast that gets into the shadows of the internet to bring you the most intriguing, enlightening, and sometimes unsettling stories from the dark web. Hosted by seasoned darknet aficionados, each episode of "Darknet Discussions" explores the intricate dynamics of darknet markets, cybersecurity threats, and the digital underworld. Join us as we interview experts, discuss the latest trends in cybercrime, and shed light on the technologies that operate beneath the surface of everyday internet use. Also, we occasionally go off on a tangent about something completely unrelated. Simply Cyber Podcast Simply Cyber Podcast The Simply Cyber Podcast is a cybersecurity resource for Freelancers and Small Businesses. The show focuses on habits and behaviors around common cyber threats leading to simple and practical solutions for many businesses. Breaking Into Cybersecurity Christophe Foulon, Renee Small It’s really a conversation about what they did before, why did they pivot in cyber, what was the process they went through Breaking Into Cybersecurity, how do you keep up, and advice/tips/tricks along the way.About Breaking Into Cybersecurity: This series was created by Renee Small &  Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our special editions are us talking to experts in their fields and cyber gurus who share their experiences of helping others break-in.Check out our new book, Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level: https://amzn.to/3443AUI About the hosts:   Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's  Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders clos Darknet Safe Daily Cybersecurity News Status One Daily Cybersecurity news, on current vulnerabilities, threats and incidents that affect you.
URL copied to clipboard!