Endpoint Security , Internet of Things Security , Open XDR

Countering Attacks That Leverage IoT

Eddie Doyle of Checkpoint Software on Mitigation Strategies
Eddie Doyle, global security strategist, Check Point Software Technologies

How are cybercrime syndicates launching attacks that leverage IoT devices? Eddie Doyle of Check Point Software Technologies offers insights on the latest attack strategies and how to counter them.

See Also: OnDemand I IoT infrastructure and Retail Operations Fireside Chat I AMPOL

In a video interview at Information Security Media Group's recent Breach Prevention Summit in Washington, Doyle discusses:

  • How high-tech cybercriminals are making hacking easy for low-tech criminals;
  • Why protecting IoT devices from hacking is a significant challenge;
  • What organizations can do to protect themselves.

Doyle is a global security strategist at Check Point Software Technologies. He is responsible for articulating the company's threat mitigation products and services to the marketplace.

About the Author

Nick Holland

Nick Holland

Former Director, Banking and Payments

Holland focused on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.