SEARCH
RESET
Associated Programs
0 Interested
Entrepreneurship
Startup Contest
Financial Services
1 Interested
Marketing
Fest | Conference Stall Sponsorship
Event Management
22 Interested
Entrepreneurship
Startup Contest
CPG | Foodtech Startup
6 Interested
Software Testing
Workshop
Data Science & Analytics
12 Interested
Entrepreneurship
B-Plan Contest
Incubation Management
3 Interested
Marketing
Workshop
Digital Marketing
0 Interested
Starts in 74 days
Music
Live Concert
Arts & Humanities
1 Interested
Theatre & Drama
Workshop
Arts & Humanities
11 Interested
Coding
Startup Contest
Technology
50 Interested
Marketing
Paid POC Projects
Digital Agency
11 Interested
Marketing
Paid POC Projects
FMCG Distribution
2 Interested
Starts in 117 days
Travel
Events
Employee Engagement
7 Interested
Entrepreneurship
Idea Contest
0 Interested
Music
Cultural Fest
5 Interested
Marketing
Fest | Conference Stall Sponsorship
    Conversations
    Start a Conversation

    Product security testing and assessment methodologies have traditionally served consumer products and enterprise applications. These programs are usually well defined, with established architectures, target markets and product development cycles that span months or years.

    Enter the Internet of Things, where there are no predefined form factors. An “IoT product” may be a smart fridge, a pacemaker, or a traffic light in a smart city. Makers of these classes of devices are often small/medium sized businesses, who are racing against the large corporates and other similar sized competitors to launch their products first. They look for standards in communication protocols, software stacks, libraries, and reuse them wherever possible. But standards are few and rarely one-size-fits-all. When it comes to securing IoT products, there are a myriad of challenges on both process and technical fronts.


    In this presentation, we discuss the new era of IoT ecosystems (which include hardware form factors, mobile applications and cloud services all working together) and the various process as well as technical challenges involved in performing security assessments and penetration tests for these solutions. We will demonstrate examples of real vulnerabilities observed in market products (consumer and industrial IoT), and discuss how and why such vulnerabilities exist.

    We conclude with a presentation of next-generation product security assurance and testing methodologies that are better suited for modern computing solutions such as Cloud and IoT.



    Join me at the TESTCON,2019 and dig deeper in this topic
    New Followers
    Abigail Sadhana
    Student | Avid Traveller
    View
    Chat
    Aravindhakshan
    Student | Hacker
    View
    Chat
    Naman Trivedi
    Student | Beauty Conscious
    View
    Chat
    Deepti
    Student | Ambitious
    View
    Chat
    Anilkumar Mehta
    Startup l SME | Ambitious
    View
    Chat
    reply