Artwork

Content provided by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Uncovering the Risks of Nation State xIoT Hacking with Bill Crowell

43:25
 
Share
 

Manage episode 352236730 series 3418676
Content provided by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Discover how former Deputy Director at the NSA Bill Crowell envisions the present and future of xIoT in this exclusive interview!

"An attacker focuses on whatever is left unprotected. And if there's not a lot of attention being given to xIoT or IoT or OT, then that's where the attacker is going to go." - Bill Crowell

Bill Crowell is a cybersecurity luminary and former National Security Agency executive with 34 years of experience in the field. He has held a variety of positions in the public and private sectors, from designing satellites to serving as the head of an intelligence organization focused on the Soviet Union during the Cold War.

During Bill Crowell's years at the National Security Agency, he was involved in the intelligence-gathering systems for the military. He also co-authored a book in 2007 predicting the convergence of physical and logical security. In the current landscape, business leaders do not understand cyber-attacks and IoT threats, making them vulnerable targets. Nation-states such as Russia, China, Iran, and North Korea are taking advantage of these vulnerabilities by focusing their attacks on xIoT devices. For example, they are using the devices to hide and exfiltrate sensitive data.

In this episode, you will learn the following:
1. How the framework of cybersecurity has evolved over the years and what impact this has had on society.
2. How nation-states are utilizing xIoT devices as a major attack vector.
3. How attackers are using xIoT devices as an entry point to gain access to sensitive data and exfiltrate it.


Let’s connect about IoT Security!

Follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

32 episodes

Artwork
iconShare
 
Manage episode 352236730 series 3418676
Content provided by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Phosphorus Cybersecurity Inc and Phosphorus Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Discover how former Deputy Director at the NSA Bill Crowell envisions the present and future of xIoT in this exclusive interview!

"An attacker focuses on whatever is left unprotected. And if there's not a lot of attention being given to xIoT or IoT or OT, then that's where the attacker is going to go." - Bill Crowell

Bill Crowell is a cybersecurity luminary and former National Security Agency executive with 34 years of experience in the field. He has held a variety of positions in the public and private sectors, from designing satellites to serving as the head of an intelligence organization focused on the Soviet Union during the Cold War.

During Bill Crowell's years at the National Security Agency, he was involved in the intelligence-gathering systems for the military. He also co-authored a book in 2007 predicting the convergence of physical and logical security. In the current landscape, business leaders do not understand cyber-attacks and IoT threats, making them vulnerable targets. Nation-states such as Russia, China, Iran, and North Korea are taking advantage of these vulnerabilities by focusing their attacks on xIoT devices. For example, they are using the devices to hide and exfiltrate sensitive data.

In this episode, you will learn the following:
1. How the framework of cybersecurity has evolved over the years and what impact this has had on society.
2. How nation-states are utilizing xIoT devices as a major attack vector.
3. How attackers are using xIoT devices as an entry point to gain access to sensitive data and exfiltrate it.


Let’s connect about IoT Security!

Follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

  continue reading

32 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide