Skip to main content
MIT Corporate Relations
MIT Corporate Relations
Search
×
Read
Watch
Attend
About
Connect
MIT Startup Exchange
Search
Sign-In
Register
Search
×
MIT ILP Home
Read
Faculty Features
Research
News
Watch
Attend
Conferences
Webinars
Learning Opportunities
About
Membership
Staff
For Faculty
Connect
Faculty/Researchers
Program Directors
MIT Startup Exchange
User Menu and Search
Search
Sign-In
Register
MIT ILP Home
Toggle menu
Search
Sign-in
Register
Read
Faculty Features
Research
News
Watch
Attend
Conferences
Webinars
Learning Opportunities
About
Membership
Staff
For Faculty
Connect
Faculty/Researchers
Program Directors
MIT Startup Exchange
John Williams - 2019 ICT Conference
Conference Video
|
Duration: 38:11
April 16, 2019
View this past event
Preview
2019-ICT-Williams
Please
login
to view this video.
Video details
Cyber Security of IoT
How can you protect yourself against threats you don’t know about? What measures can you take to assess your risk before a breach? How can you protect yourself against an attack that originates in an innocuous object like a toaster? Professor John Williams will discuss how organizations can prepare themselves to defend against cybersecurity threats to protect their enterprises. He will discussrisk a modeling and data analytics tool (Saffron), that helps to identify risk tolerance and strategies for assessing, responding to, and monitoring cyber security risks.
Locked Interactive transcript
Please
login
to view this video.
Video details
Cyber Security of IoT
How can you protect yourself against threats you don’t know about? What measures can you take to assess your risk before a breach? How can you protect yourself against an attack that originates in an innocuous object like a toaster? Professor John Williams will discuss how organizations can prepare themselves to defend against cybersecurity threats to protect their enterprises. He will discussrisk a modeling and data analytics tool (Saffron), that helps to identify risk tolerance and strategies for assessing, responding to, and monitoring cyber security risks.
Locked Interactive transcript
More Videos From This Event
See all videos
April 2019
|
Conference Video
Will Oliver - 2019 ICT Conference
Introduction to Quantum Computing
April 2019
|
Conference Video
Wojciech Matusik - 2019 ICT Conference
Computational Design and Manufacturing
April 2019
|
Conference Video
Stephanie Woerner - 2019 ICT Conference
Creating the Next Generation Enterprise
April 2019
|
Conference Video
George Westerman - 2019 ICT Conference
Leading Digital Transformation: How You Can Make Your Company into a Digital Master
April 2019
|
Conference Video
STEX - 2019 ICT Conference
Startup Lightning Talks
April 2019
|
Conference Video
Stephen Spear - 2019 ICT Conference
Discovering Your Way to Greatness: How the Most Successful Organizations Repeatedly Get to the Right Answers Fastest
April 2019
|
Conference Video
Abel Sanchez - 2019 ICT Conference
Situational Awareness Tool for Cyber Security Event Prediction and Quantification (SAFFRON)
April 2019
|
Conference Video
Anthony Patera - 2019 ICT Conference
Artie: An Artificial Heat Transfer Student
April 2019
|
Conference Video
Daniel Oran - 2019 ICT Conference
Implosion Fabrication
April 2019
|
Conference Video
Muriel Médard - 2019 ICT Conference
The Network in Network Coding
April 2019
|
Conference Video
Alex Pentland - 2019 ICT Conference
MIT TRUST::DATA CONSORTIUM
April 2019
|
Conference Video
Neil Gershenfeld - 2019 ICT Conference
How to Survive and Thrive in the Third Digital Revolution