Skip to content
Explore All

IoT Risks: Tactics, Techniques and Procedures to Remediate


Course
Enroll

Panel featuring leaders Dhananjay Rokde, Jasbir Singh Solanki and Sujit Christy explore tactics and techniques for IoT/OT device security and risk remediation.

Security leaders agree that IoT and OT devices, including network-attached storage devices, hold valuable data that ransomware groups seek to compromise.

These devices lack robust security measures such as those found in other endpoints.

Some security leaders believe that implementing endpoint detection and response on IoT and OT devices is challenging due to lack of agent support and specific security features. While IoT risks are an enterprise-wide challenge, having right remediation tactics, techniques and measures to counter the risks is critical.

It is crucial to have these to ascertain the behavior of a threat actor and assess the structured framework for executing a cyberattack.

The panelists will discuss:

  • What should the TTPs constitute in remediating IoT risks
  • Defending the devices while maintaining privacy
  • CISOs’ consideration on the right investments and accountability

Here is the course outline:

IoT Risks: Tactics, Techniques and Procedures to Remediate