Understanding Vulnerabilities Across the IoT & Your Supply Chain
The corporate attack surface is rapidly expanding: how can security professionals get ahead of the curve and create resilient organizations? Recent events suggest that easily-exploitable vulnerabilities are all too common, and they’re not limited to the technologies we commonly consider; Internet of things (IoT) devices could represent the next great risk to the enterprise, not to mention third-party supply chain partners. The challenge is growing more serious each day. BitSight recently announced the discovery of critical vulnerabilities in a popular IoT device – a vehicle GPS tracker – potentially allowing hackers to track vehicles, remotely disable corporate fleets, and more. Explore media coverage on this research in The Associated Press, Bloomberg, and TechCrunch.
1 CPE Credit
Facilitated By:
Jake Olcott
![](https://lwfiles.mycourse.app/grc-cpe-public/dac5cadd06797bb55b02c4f4a57055a3.png)
Created By:
Chris Burton
![](https://lwfiles.mycourse.app/grc-cpe-public/17728d2e61c685eecb41034351061ff6.png)
![](https://lwfiles.mycourse.app/grc-cpe-public/fa85417f2ec67dacc59c846038a42a19.png)