Artwork

المحتوى المقدم من Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

Uncovering the Risks of Nation State xIoT Hacking with Bill Crowell

43:25
 
مشاركة
 

Manage episode 352236730 series 3418676
المحتوى المقدم من Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Discover how former Deputy Director at the NSA Bill Crowell envisions the present and future of xIoT in this exclusive interview!

"An attacker focuses on whatever is left unprotected. And if there's not a lot of attention being given to xIoT or IoT or OT, then that's where the attacker is going to go." - Bill Crowell

Bill Crowell is a cybersecurity luminary and former National Security Agency executive with 34 years of experience in the field. He has held a variety of positions in the public and private sectors, from designing satellites to serving as the head of an intelligence organization focused on the Soviet Union during the Cold War.

During Bill Crowell's years at the National Security Agency, he was involved in the intelligence-gathering systems for the military. He also co-authored a book in 2007 predicting the convergence of physical and logical security. In the current landscape, business leaders do not understand cyber-attacks and IoT threats, making them vulnerable targets. Nation-states such as Russia, China, Iran, and North Korea are taking advantage of these vulnerabilities by focusing their attacks on xIoT devices. For example, they are using the devices to hide and exfiltrate sensitive data.

In this episode, you will learn the following:
1. How the framework of cybersecurity has evolved over the years and what impact this has had on society.
2. How nation-states are utilizing xIoT devices as a major attack vector.
3. How attackers are using xIoT devices as an entry point to gain access to sensitive data and exfiltrate it.


Let’s connect about IoT Security!

Follow Phillip Wylie at https://www.linkedin.com/in/phillipwylie
https://youtube.com/@phillipwylie

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

49 حلقات

Artwork
iconمشاركة
 
Manage episode 352236730 series 3418676
المحتوى المقدم من Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Discover how former Deputy Director at the NSA Bill Crowell envisions the present and future of xIoT in this exclusive interview!

"An attacker focuses on whatever is left unprotected. And if there's not a lot of attention being given to xIoT or IoT or OT, then that's where the attacker is going to go." - Bill Crowell

Bill Crowell is a cybersecurity luminary and former National Security Agency executive with 34 years of experience in the field. He has held a variety of positions in the public and private sectors, from designing satellites to serving as the head of an intelligence organization focused on the Soviet Union during the Cold War.

During Bill Crowell's years at the National Security Agency, he was involved in the intelligence-gathering systems for the military. He also co-authored a book in 2007 predicting the convergence of physical and logical security. In the current landscape, business leaders do not understand cyber-attacks and IoT threats, making them vulnerable targets. Nation-states such as Russia, China, Iran, and North Korea are taking advantage of these vulnerabilities by focusing their attacks on xIoT devices. For example, they are using the devices to hide and exfiltrate sensitive data.

In this episode, you will learn the following:
1. How the framework of cybersecurity has evolved over the years and what impact this has had on society.
2. How nation-states are utilizing xIoT devices as a major attack vector.
3. How attackers are using xIoT devices as an entry point to gain access to sensitive data and exfiltrate it.


Let’s connect about IoT Security!

Follow Phillip Wylie at https://www.linkedin.com/in/phillipwylie
https://youtube.com/@phillipwylie

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

49 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

حقوق الطبع والنشر 2025 | سياسة الخصوصية | شروط الخدمة | | حقوق النشر
استمع إلى هذا العرض أثناء الاستكشاف
تشغيل