How is IT changing? What are the new technologies? How is my job changing?
At Interop, we nurture every aspect of your career by offering content across all key technologies and stages of your career. Experience collaboration and innovation with the industry’s most thought after leaders. Be sure to check back often as we’re adding sessions and speakers weekly!
Please note, Interop Trainings sell out! If you’re interested in participating in Trainings, we suggest registering early.
David Pearson (Principal Threat Researcher, Awake Security)
Eric Poynton (Lead Network Threat Hunter, Awake Security)
Pass Type: All Access, Conference - Get your pass now!
Event Type: Session
Vault Recording: TBD
Audience Level: Intermediate
It's estimated this year that the number of unmanaged devices will bypass the number of managed devices within a typical organization. These unmanaged devices don't have typical policies or endpoint controls which makes it extremely difficult to understand how they communicate with the network. This lack of visibility makes it virtually impossible to understand what an organization's true threat landscape is.
This presentation is the culmination of more than a year of research into identifying unmanaged devices using behavioral cues fundamental to how IoT devices function. This method can be used to understand risks associated with unmanaged IoT devices, including: