prpl @ Smart Home Summit, Palo Alto, NOV 15-16 2017

*** Ask me about free pass and 30% off VIP discount ***
https://tmt.knect365.com/smart-home/speakers/cesare-garlati-1#

Track 1 – Future Smart Homes 12:00 – 12:40

Panel: Security at the edge: beyond security cameras and doorbells – properly secured devices defending the home

  • Security from the inside – protected devices and gateways
  • Intangible digital security to help defend the physical home
  • Creating a ‘bot army’ to defend your home
  • anticipating an unknown, unsecure future

Track 1 – Future Smart Homes 14:20 – 14:40

Presentation: How to Secure the Smart Home from Cyber Threats

  • Recent security threats targeting smart homes and smart devices
  • Analysis of the results of prpl Foundations’ Smart Home Security Report
  • Top 10 best practice tips for securing Smart Home

The smart home is the new battlefront in the war against cyber threats. The latest disclosures from WikiLeaks have revealed that intelligence agencies has been spying on users through home gateways for over a decade. That’s not to mention the threats coming from financially motivated cybercriminals. As the Mirai incident has shown us, consumer-grade devices are woefully exposed to hackers. And consumers seem to lack the will or knowledge to fight back. Or do they? What we know about the security threats facing the smart home and consumer attitudes is largely based on anecdotal and piece meal evidence. This presentation will aim to set the records straight, analyzing the results of the first global research on Smart Home Security commissioned by prpl Foundation. We can reveal that consumers actively avoid smart products which don’t offer enough in-built security – which should be a wake-up call to manufacturers everywhere. Attendees will leave taking away a list of best practice tips to help secure their smart homes. The findings will also be food for thought for IoT industry stakeholders looking for guidance in how best to approach security in the world of embedded computing.

When IoT Attacks – The End of the World as We Know It?

Excerpts of my interview with Phil Muncaster @philmuncaster

InfoSecurity Magazine Q4/2017, 4 October 2017

https://www.infosecurity-magazine.com/digital-editions/digital-edition-q4-2017/

Focus on the Firmware

A cursory look at OWASP’s IoT Security Guidance will highlight just how many elements in the IoT ecosystem could be exploited. Among others, these include the web interface, network, transport encryption layer, mobile app and device firmware. The latter is a key area of focus for the prpl Foundation, a non-profit which is trying to coral the industry into taking a new hardware-based approach to IoT security. Cesare Garlati, Chief Security Strategist, claims that hackers could exploit IoT chip firmware to re-flash the image, allowing them to reboot and execute arbitrary code.

Continue reading

2017 Arm TechCon: See prpl!

If you’re attending the 2017 ARM TechCon, don’t miss these important sessions related to embedded security!

First, Cesare Garlati, Chief Security Strategist at the prpl Foundation, and Imperas CEO Simon Davidmann will participate alongside other industry experts in a panel discussion:  Hypervisors:  A Real Trend in Embedded, or Just Hype?” 

  • When: Wednesday, October 25 from 10:30am – 11:20am
  • Where: Ballroom F

Also, see a demonstration of an important development – multi-domain security as outlined in the prpl Security Guidance for Critical Areas of Embedded Computing. Cesare from prpl will demonstrate how to build and run a secure application on a real-world implementation of the prplSecurity™ framework including: the prplHypervisor™, prplSecureInterVM™ communications, and prplPUF™ APIs. A Q&A period will follow. Don’t miss this opportunity to learn how you can build an even deeper level of trust into your designs.

    • When: Wednesday, October 25 from 11:45am – 12:15pm
    • Where: Imperas booth #421

If you can’t make it, please contact info@prplfoundation.org to arrange a personal demonstration at an alternate time.