Hacking the Internet of Things (BCS Bedford branch and IET)
Date | Tuesday 13 May 2014 | ||||||||||
Time | 18:00 for 18:30 | ||||||||||
Location | Room P32, University of Bedfordshire, Polhill Avenue, Bedford, MK41 9EA. | ||||||||||
Speaker | Geraint Williams Information Risk Consultant and Trainer, IT Governance Ltd., Honorary Visiting Fellow at the University of Bedfordshire. | ||||||||||
Abstract | You are warmly invited to attend a free evening lecture at the University’s Polhill Campus on Tuesday 13 May 2014. “Hacking the Internet of Things” will be the subject of the talk by Geraint Williams, Information Risk Consultant and Trainer, IT Governance Ltd., and Honorary Visiting Fellow at the University of Bedfordshire. The Internet of Things describes a paradigm of how electronic devices including everyday items are now interconnected by various media to each other locally and across the Internet. This allows them to exchange information and to interact with us in order to make life easy. You can now control the heating in your home from a smart phone app or monitor the movement of hundreds of buoys free floating in ocean currents from anywhere in the world. The Internet of Things has great potential for aiding us. However the potential for malicious activities is just as great. This talk discusses the Internet of Things and its potential. This will be followed by discussions and demonstrations of how the Internet of Things can be hacked to reveal details of our interactions or to take control of the environment around us. | ||||||||||
Profile | Geraint Williams is an Information Risk Consultant and Trainer for IT Governance Ltd. and an Honorary Visiting Fellow at the University of Bedfordshire. Geraint is a knowledgeable and experienced Information Security consultant with experience including vulnerability testing, digital forensics, secure networking, and wireless security issues. Geraint has a strong technical knowledge of security and IT infrastructure including high performance computing. Geraint has a number of certifications in security and digital forensics including CISSP, CISA, CEH and CHFI. | ||||||||||
Agenda |
|