Malware in IoT, Crypto-coins & Smart Devices - Prevention and Appropriate Action

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Malware continues to be a problem, particularly in the case of gaining visibility into incidents, which leaves you blind to attack. The rapid growth of IoT botnets provides a challenge to businesses deploying unprotected IoT devices and is a threat to networks’ integrity. Networks and personnel must be able to detect and remove rogue IoT devices.

In this webinar, we will look at learnings from Nokia’s annual Threat Intelligence report, as well as identifying tools that can be used to detect and mitigate malware in those environments, and the changing balance of responsibility between the end-user, enterprise and the service provider for protecting against these threats.

Key takeaways:

  • How you can gain visibility into malware infestations
  • What to expect from leading service providers that step up to the challenge of protecting customers against malware infestations
  • Current trends in IoT and crypto-mining exploits, mobile and fixed device malware
  • Which mobile platforms are the most vulnerable

Speakers

Photo of Patrick Donegan

Patrick Donegan

Founder and Principal Analyst, HardenStance

Photo of Kevin McNamee

Kevin McNamee

Head of Threat Intelligence Lab, Nokia

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.