On-Demand Webinar

Understanding P2P Networks
How They Access and Exploit Devices

Making a bug-ridden IoT device that is directly accessible to the internet is surely a bad idea. However, millions of IoT devices are still shipping with features that make them vulnerable the moment they come online, even in the presence of NAT and firewalls. P2P, or “peer-to-peer”, is a convenience feature designed to make the lives of users easier, but it has the undesirable side effects of making attackers’ jobs easier as well.

In this webinar you will find out

  • How supply chain vulnerabilities in modern IP cameras, baby monitors, and alarm systems are putting millions at risk by eavesdropping and remote compromise
  • How the vast number of IoT devices are vulnerable to attacks by botnets
  • How undesired actors exploit P2P networks to jump firewalls, steal camera passwords over the internet, and correlate devices to physical addresses

Topics covered

All about P2P – a convenience feature found in millions of IoT devices

How P2P exposes devices to the world

How the devices are exploited

eInfochips IoT security services overview


Malav Parikh

Cyber Security Expert, Investigation and Incident Response

Malav Parikh is a Cyber Security Expert at eInfochips. He has done certifications like CEH, CHFI, ECIH, DPO, IBM-CAD, 100W-ICS among others. Malav carries experience in security engineering, application security in web, mobile, IOT & Cloud, System and Network Security, Cryptography and Security Protocols.

Who will benefit from the webinar?

IoT Security, Managed Security, DevSecOps practitioners

Watch the Recording

By submitting the form, you are agreeing to eInfochips Terms & Conditions and Privacy Policy, including receipt of emails and newsletters.