Sveriges mest populära poddar

Embedded Insiders

Threat Modeling and Intelligence While Working from Home

52 min • 19 mars 2021

Send us a text

During a recorded presentation from  embedded world 2021, Rich and Brandon are joined by Technology Editor Curt Schwaderer, who doubles as Vice President of Engineering at intelligence and security provider Yaana Technologies. The three discuss how the tech industry in particular and connected organizations in general have transitioned from protecting devices from attacks to accepting they will be hacked and mitigating losses to modern threat intelligence and modeling strategies. They then look at this evolution through the lens of employees, who are handling and working with sensitive information and IP, working from home.

DON'T  FORGET  TO REGISTER  FOR A FREE EMBEDDED WORLD-IN-A-BOX! LESS THAN 100 REMAIN! GET YOURS TODAY: https://www.embeddedcomputing.com/pages/ew-in-a-box-reg

Later, Vincent Scott, Founder of Defense Cybersecurity Group, Chief Security Officer at STI-TEC, and former Navy cryptologist joins the Insiders to review the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) and what it will mean for companies delivering technology to the U.S. Armed Forces. In Scott's view, the CMMC presents obstacles – such as an assumption of on-premise infrastructure – that may make companies just starting out reconsider serving those markets and subsequently impact the nation's cyber readiness.

Finally, Brandon fills in for Perry in this week's Tech Market Madness. A recent report from Dragos indicates that threats to industrial control systems tripled in 2020,  while 90 percent of organizations  don't  have visibility into what's taking place beyond the IT/OT network boundary. Brandon investigates just what could be going on back there as he reviews how another industrial cybersecurity firm,  Claroty, uncovered vulnerabilities in  WIBU Systems' CodeMeter licensing software deployed on ICSs worldwide. Sharon Brizinov, a Claroty researcher, demonstrates just how easy it could have been to compromise systems running the software, both locally and remotely.


For more information, visit embeddedcomputing.com

Förekommer på
00:00 -00:00