Duration:
4 days
Audience:
Project managers, Security experts with no experience of IoT, Developers, IoT manufacturers, Startups

 

An IoT system is a system of systems, each element having its own complexity. It is a challenge to secure each elements individually and operating as a system. Today's IoT systems are poised with vulnerabilities that present risks to safety and privacy, with potential impacts on a business.

In this 4 days training course, participants will learn become a subject matter expert in IoT security. Starting from the differences between IoT and IT systems, we explain why IoT systems are vulnerable to cyber threats and introduce several element to secure them. Throughout this training, we will conceive our own secure IoT solution (no programming required) to apply what we learn during this course.

This training course is ideal for non-technical participants such as project managers, IoT manufacturers, IoT startups, who want to learn the basis of IoT security.

This training course is also built for technical experts who want to update their knowledge on IoT security: security experts with no experience of IoT, developers.

This training integrates elements of ENISA IoT guidelines and OWASP IoT Top 10.

Objectives:

  • Understand the security challenges of IoT systems
  • Get up to date with the latest security threats and vulnerabilities to IoT systems
  • Be able to assess IoT threats and risks for devices, networks, mobile applications and cloud systems
  • Analyse cyber attacks on IoT system and understand the kill chain.
  • Learn about good security practices and how they apply to prevent cyber attacks
  • Be able to apply the concepts of security and privacy by design
  • Understand the future of IoT security

Programme:

  • Introduction to IoT systems and their differences with IT systems
  • The security challenges of IoT
  • The threats to IoT systems and the risks on users, systems and the society
  • Deconstructing high-profile cyber attacks against IoT
  • Good security practices and bad security practices for IoT (at several levels: governance, organisational, operational and technical)
  • Application of these good security practices to prevent the cyber attacks previously analysed
  • Security by design: how to secure project management and product development
  • Privacy and GDPR for IoT
  • Beyond good security practices: standardisation, certification, label
  • The future of IoT security: AI, blockchain, SDN and dynamic networks

 

To receive a quote or to register, please contact us.