Jessica Entwistle
June 20 2025
We dive into the threats hidden in everyday smart devices – from insecure cameras to exposed sensors. Learn how attackers exploit these gaps, why compliance matters, and how to protect your business as it adopts connected technology.
In this session, we cover:
📱 Common IoT device vulnerabilities
🚪 How attackers exploit IoT weaknesses
🛡️ The role of standards and compliance
⚙️ Steps to strengthen your IoT security