IAAC Cyber Leadership Forum
Institute Of Directors 116 Pall Mall, London, United KingdomKen Munro will be presenting: Ransomware & IoT
Ken Munro will be presenting: Ransomware & IoT
Vangelis Stykas is presenting: Charge my car, for free, forever! Current trends show that electric cars and green energy, especially photo-voltaic energy, are being widely adopted in both commercial and home user markets. During this talk, we will see that they suffer from typical "rush to market" problems that can potentially allow a remote attacker […]
Ken Munro will be presenting.
The ISACA dinner 25 November will start with a live IoT hacking session with Jo Dalton, Associate Partner, Pen Test Partners. https://www.linkedin.com/posts/isaca-sweden-chapter_breaking-news-the-isaca-dinner-25-november-activity-6866362477664370688-UKEB/
Pwning 10^7 devices in 10^1 minutes across 10^2 endpoints Vangelis will cover in 10 one-minute slides how anyone could control 10^7 (that’s 10 million) devices by exploiting a series of simple yet critical API flaws that were typical “rush to market” flaws that can allow an attacker to control and even use them as […]
Vangelis Stykas will be presenting: Current trends show that electric cars and green energy, especially photo-voltaic energy, are being widely adopted in both commercial and home user markets. During this talk, we will see that they suffer from typical “rush to market” problems that can potentially allow a remote attacker to control them. This could […]
Ken Munro will be presenting: We need to talk about sex toys and cyber security Tickets: https://www.universe.com/events/tedxdornbirn-26022022-tickets-GXC1W6
Ken Munro will be joining the Secure By Design session. Full details here https://www.mwcbarcelona.com/agenda/session/secure-by-design
In this session we will look at how modern hackers gain access to your customers data, we will explore the how ransomware operators work, how they obtain access, be that from staff selling VPN credentials to your staff’s terrible passwords. We will show how your room occupancy monitors and meeting room products could lead to […]
Cyber risks and Railways. Fixing OT to keep the hackers out OT / ICS / IIoT are relatively niche technology areas, but share a common purpose; to enable industrial ‘things’. Gartner’s description of OT nails it “…hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, […]