WEBINAR DETAILS
  • About
    Please note: This session is part of our IoT Device Security Virtual Conference. Learn more and register for the full event here.

    A brief foray into how attackers get root-level access, general attack flow and real world examples concluding with how we can use: defense in depth, threat models, and principles of least privilege and secure / immutable configurations to help secure our systems given an attacker has root-level execution.

    Sponsored by:

    Star Lab
  • Price
    Free
  • Language
    English
  • OPEN TO
    Anyone with the event link can attend
  • Dial-in available
    (listen only)
    Not available.
FEATURED PRESENTERS