John Williams - 2017 ICT Conference

Conference Video|Duration: 40:38
April 12, 2017
Conference-AI-Data
Please login to view this video.
  • Video details

    Cyber Security of IoT

    How can you protect yourself against threats you don’t know about? What measures can you take to assess your risk before a breach? How can you protect yourself against an attack that originates in an innocuous object like a toaster? Professor John Williams will discuss how organizations can prepare themselves to defend against cybersecurity threats to protect their enterprises. He will discussrisk a modeling and data analytics tool (Saffron), that helps to identify risk tolerance and strategies for assessing, responding to, and monitoring cyber security risks.

Locked Interactive transcript
Conference-AI-Data
Please login to view this video.
  • Video details

    Cyber Security of IoT

    How can you protect yourself against threats you don’t know about? What measures can you take to assess your risk before a breach? How can you protect yourself against an attack that originates in an innocuous object like a toaster? Professor John Williams will discuss how organizations can prepare themselves to defend against cybersecurity threats to protect their enterprises. He will discussrisk a modeling and data analytics tool (Saffron), that helps to identify risk tolerance and strategies for assessing, responding to, and monitoring cyber security risks.

Locked Interactive transcript