Strategies for Protecting IoT Devices and Networks from Cyber Attacks with Russ Schafer

Subscribers:
79,800
Published on ● Video Link: https://www.youtube.com/watch?v=BYn_qWGr0Lk



Duration: 24:55
1,974 views
19


Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 63% of enterprises, 92% of industrial organizations and 82% of health care organizations use IoT, almost every company is exposed. A range of IoT devices are connected to IT and OT networks including IP camera’s, MRI machines and industrial control systems. Unfortunately, connecting IoT devices to the network extends the attack surface providing more entry points for hackers. Check Point will discuss how to implement security strategies that prevent a range of IoT cyber attacks from phishing and ransomware to crypto mining by:
· Exposing all IoT security risks across IT and OT networks
· Easily creating policies to secure thousands of IoT devices
· Preventing both network-based and device-level attacks




Other Videos By Check Point Software


2021-01-27CloudGuard CSPM Posture Management Introduction
2021-01-27CloudGuard Posture Management Capabilities for Network Security
2021-01-25Do More on Microsoft Azure with Check Point CloudGuard
2021-01-19Protección contra el nuevo ransomware relacionado con Cyberpunk 2077
2021-01-15NRF 2021 Retail’s Big Show: Your eCommerce Platform is High Fashion, What About the Security?
2021-01-15Protecting Against the New Cyberpunk 2077-Related Ransomware
2021-01-13Lateral Movement Under the Radar – Attack & Investigation Series
2021-01-08Check Point Partners: Learn about Demos, Tools, and Resources
2021-01-06CloudGuard CSPM Network Training Video
2020-12-312020 Check Point
2020-12-15Strategies for Protecting IoT Devices and Networks from Cyber Attacks with Russ Schafer
2020-12-14Introduction to CloudGuard on Oracle Cloud Infrastructure: Peace of Mind as You Migrate to the Cloud
2020-12-04Account Takeover exploiting vulnerability in Android's Play Core Library Code - Demo
2020-12-02Siemplify SOAR + Check Point Integration – Playbook and Demo
2020-12-0140% of the World's Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk?
2020-12-01A Glimpse Into The Future of Cyber Security
2020-11-24IDC Presents: Cloud Security, COVID-19, the New Normal and the Next Normal
2020-11-23Part #8: 5 Must-Have Protections for Office 365 and G Suite
2020-11-23Part #6: 5 Principles for Choosing the Right Mobile Security Solution
2020-11-23Part #5: The New and Dangerous Wave of Mobile Threats
2020-11-23Part #4: 5 Principles for Choosing the Right Endpoint Security