Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Security by Obscurity: The Flip-Side of the Compliance Coin

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Bringing an idea from prototype to product involves challenges, including the need to comply with international standards and government regulations. This is especially true in industries such as construction, pharmaceutical and transportation, where lives are at stake. Regulatory and compliance requirements help create safer, more reliable products. Moreover, well-defined standards for interfaces, protocols and architecture elements add granularity, enable collaboration between manufacturers and are instrumental in creating global ecosystems.

Standards and compliance assure a level of quality and interoperability, but from a malicious agent’s point of view, they level the playing field in terms of attack surface. An attacker that finds a design flaw in a standard such as the HTTP suite or a security vulnerability can leverage the system’s widespread use to expand the reach of an attack campaign.

In this webinar, we’ll discuss:

  • How compliance and standardization can amplify the spread of malware and increase the damage rendered by security vulnerabilities
  • Why the automotive industry is an intriguing example of how the old-fashioned notion of ‘security by obscurity’ can efficiently contain potential harm

Speakers

Mike  Gillespie

Managing Director & Co-Founder, Advent IM Ltd

Michael Hill

Acting Editor , Infosecurity Magazine

Matan Scharf

Manager of Automotive Solutions, Synopsys

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.