SEARCH
RESET
Associated Programs
0 Interested
Entrepreneurship
Startup Contest
Financial Services
1 Interested
Marketing
Fest | Conference Stall Sponsorship
Event Management
22 Interested
Entrepreneurship
Startup Contest
CPG | Foodtech Startup
6 Interested
Software Testing
Workshop
Data Science & Analytics
14 Interested
Entrepreneurship
B-Plan Contest
Incubation Management
3 Interested
Marketing
Workshop
Digital Marketing
0 Interested
Starts in 14 days
Music
Live Concert
Arts & Humanities
1 Interested
Theatre & Drama
Workshop
Arts & Humanities
11 Interested
Coding
Startup Contest
Technology
50 Interested
Marketing
Paid POC Projects
Digital Agency
11 Interested
Marketing
Paid POC Projects
FMCG Distribution
3 Interested
Starts in 57 days
Travel
Events
Employee Engagement
9 Interested
Entrepreneurship
Idea Contest
0 Interested
Music
Cultural Fest
5 Interested
Marketing
Fest | Conference Stall Sponsorship
    Conversations
    Start a Conversation

    Product security testing and assessment methodologies have traditionally served consumer products and enterprise applications. These programs are usually well defined, with established architectures, target markets and product development cycles that span months or years.

    Enter the Internet of Things, where there are no predefined form factors. An “IoT product” may be a smart fridge, a pacemaker, or a traffic light in a smart city. Makers of these classes of devices are often small/medium sized businesses, who are racing against the large corporates and other similar sized competitors to launch their products first. They look for standards in communication protocols, software stacks, libraries, and reuse them wherever possible. But standards are few and rarely one-size-fits-all. When it comes to securing IoT products, there are a myriad of challenges on both process and technical fronts.


    In this presentation, we discuss the new era of IoT ecosystems (which include hardware form factors, mobile applications and cloud services all working together) and the various process as well as technical challenges involved in performing security assessments and penetration tests for these solutions. We will demonstrate examples of real vulnerabilities observed in market products (consumer and industrial IoT), and discuss how and why such vulnerabilities exist.

    We conclude with a presentation of next-generation product security assurance and testing methodologies that are better suited for modern computing solutions such as Cloud and IoT.



    Join me at the TESTCON,2019 and dig deeper in this topic
    New Followers
    MERUVA PRANATHI
    Student | Event/ Fest Organiser
    View
    Chat
    Tejaswini
    Student | Ambitious
    View
    Chat
    Rakesh Kundu
    Student | Digital Savvy
    View
    Chat
    Pranjal Mittal
    Student | Entrepreneurial
    View
    Chat
    Navaneeth
    Student | Workaholic
    View
    Chat
    reply