IOT - Part 2 Managing vulnerabilities

BVCPS Webinar

Reserve Your Spot
Webinar Registration
loader
Register for the FREE Webinar

To validate your product is protected against all known vulnerabilities, you firstly need to understand what the known vulnerabilities are and then secondly test your connected object to validate it is protected. Joining the webinar, you will get 1st hand information covering:

 

  • What are the key vulnerabilities and what are their sources
  • How you can assess your connected products against all known vulnerabilities
  • Introduction to P-SCAN – an automated test platform to detect vulnerabilities and protocol implementation defects for communications interfaces (Zigbee, Bluetooth®, WiFi®)
  • Overview of our technical partner, CEA-Leti, a world leading cybersecurity research organization
  • Penetration Testing Essentials for Consumer IoT Devices
  • Introduction to our global network of accredited labs and technical centers in France, USA, China and Taiwan who can support you with enabling smooth market access and a good end-customer experience.