SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsBusiness leaders and risk management decision-makers are unaware of how the Internet of Things (IoT) increases the threat surface to business assets and devices. Emerging network technologies such as Thread and Zigbee are creating unmonitored, bi-directional connections into business networks due to the rise of IoT integration into devices found in businesses today. Designed for minimal processor requirements and low power consumption, implementing security controls on individual IoT devices is not possible. Utilizing segmentation and open-source border routers increases a company’s security posture by restricting lateral movement and enabling visibility of how these devices interconnect to the business’ data networks. Following the Center for Internet Security Controls methodology, these techniques provide an effective strategy to mitigate potential risks of implementing IoT in business environments.