Webinar – Wireless and IoT Visibility for IT and OT Environments 

 Risks stemming from SmartTVs, Wireless Storage Devices, Surveillance Cameras, Wireless Printers, and more are introducing new exposures to every organization. Join us in this enlightening webinar that reveals this growing threat landscape and obtain new ideas for fortifying your IT and OT networks. 

* Overview of the wireless and IoT threat landscape
* Gain incites from our Threat Research team about vulnerabilities they’ve revealed at conferences including DEF CON and RSA 
* Learn how to assess your own deployment and look for unmanaged IoT devices and networks, Shadow IoT, and other risks that can allow disruption of IT and OT networks
* A recommended strategy for mitigating these risks and allow organizations to embrace IoT 

 

 

Countdown to webinar

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

The Presenter: 
Michael T. Raggo, Chief Security Officer, 802 Secure (CISSP, NSA-IAM, CSI) has over 20 years of security research experience. His current focus are wireless IoT threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books, and contributing author for “Information Security the Complete Reference 2nd Edition”. His Data Hiding book is also included at the NSA’s National Cryptologic Museum at Ft. Meade.
A former security trainer, Michael has briefed international defense agencies including the FBI, Pentagon, and Queensland Police; is a frequent presenter at security conferences including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon, and SANS; and has been featured on CNN Tech, TIME, Bloomberg, Forbes, and numerous other television and media outlets. He was also awarded the Pentagon’s Certificate of Appreciation.