Ken Munro will be presenting: The IoT is littered with security disasters. As the distinction from OT blurs how do we avoid repeating them? This session will explain, with hacking examples, what happens when a historically isolated tech environment meets an always connected and messy ecosystem. OT is falling in line with IoT at pace, […]
Ken Munro will be presenting: Hacking Wind Turbines and other Industrial Control System Cyber Attacks Identifying wind turbine components and telemetry systems that can be remotely accessed What can and does go wrong in cyber -attacks against ICS What lessons can be learned from other forms of power generation
Ken Munro will be presenting: Tesla Teardown. Security issues in hardware and firmware update mechanisms Tesla has long been seen as a trailblazer in its design and is respected for its security. But issues can still occur. It’s Achilles heel is perhaps its remote update mechanism, which, if exploited could allow an attacker to execute code, […]
Ken Munro will be presenting: Hacking Heavy Plant and other ICS / OT Cyber Attacks With crossovers in technology including IIoT & OT, ICS has never looked more different See what can and does go wrong in cyber-attacks against ICS Learn from the cyber mistakes made in IoT over the last 5 years
Join this virtual roundtable of cybersecurity experts with experience researching and testing the cyber resilience of connected aircraft systems. The cyber resiliency of connected aircraft systems remains an essential topic of discussion across multiple segments of the aviation industry. In October 2020, a new report published by the U.S. Government Accountability Office (GAO) called for […]
Information Security Summit - Challenge of Securing the New Norm: the Remote, Mobile, Decentralised and Virtual Business Ken Munro will be talking about IoT security: Details TBC