How do we build connected devices in a secure way, and what are the likely scenarios where hackers could pwn your connected home?
Whimsical: whether it’s pranking your neighbor so his printer declares that it has achieved sentience, or programming your neighbor’s lights to deliver messages in Morse code, we can expect some hacks to be embarrassing but not harmful.
Serious: connecting cars and security devices offers convenience, but also introduces new risks. What if hackers get access to the brakes on your car, or the locks to your front door? Our track record with securing data online suggests that most products won’t be difficult to break into. We’ll cover the most likely risk scenarios with connected devices.
For developers and designers: how do we build devices with strong security in mind? We’ll cover some design patterns and technical approaches (including identity management, identity authentication, encryption, and data management) that will apply across a range of connected devices.
Elissa Shevinsky is a security researcher, and CEO of Jekudo Privacy Company.
Jekudo is building secure group collaboration tools. Shevinsky has spoken about security
and privacy at events like DefCon, Shmoocon, and SXSW. Elissa is also
editor of the upcoming anthology “Lean Out” published by OR Books.
Elissa has been building successful startups since she joined Geekcorps
as an R&D intern in 2000. She learned how to build software at Everyday
Health (filed for IPO in 2010) in 2003. In 2008 she started her first company.
Contact Debbie Holmgren at email@example.com
For information on how to participate, visit our Call for Startups.
For information on trade opportunities with O'Reilly conferences, email firstname.lastname@example.org
View a complete list of Solid contacts
©2015, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • email@example.com