webinar register page

Webinar banner
Hacking and Securing LoRaWAN Networks
LoRaWAN is becoming the most popular low-power wide-area network (LPWAN) open standard protocol used around the world for Smart Cities, IIoT, Smart Building, etc. LoRaWAN protocol has “built-in encryption” making it “secure by default.” This results in many users blindly trusting LoRaWAN networks without being diligent in assessing security concerns; the implementation issues and weaknesses can make the networks vulnerable to hacking.

Currently, much of the cybersecurity problems of LoRaWAN networks, are not well known. Also, there are no available tools for LoRaWAN network security testing/auditing and attack detection, which makes LoRaWAN deployments a vulnerable target for attackers.

In this webinar, we'll explore the current cybersecurity problems, including the possible attack scenarios, and provide useful techniques on how you can detect them.

Apr 22, 2020 02:00 PM in Eastern Time (US and Canada)

Webinar logo
* Required information


Cesar Cerrudo
CTO @IOActive, Inc.
Cesar Cerrudo leads the IOActive Labs in producing ongoing, cutting-edge research. Cesar manages IOActive’s responsible disclosure process and is the main liaison between IOActive and CERT. Formerly the founder and CEO of Argeniss Consulting, acquired by IOActive, Cesar is a world-renowned security researcher and specialist in application security. Cesar is credited with discovering and helping to eliminate dozens of vulnerabilities in leading applications, including Microsoft SQL Server, Oracle database server, IBM DB2, Microsoft Windows, Yahoo! Messenger, and Twitter. He has a record of finding more than 50 vulnerabilities in Microsoft products and more than 20 in Microsoft Windows Operating Systems. Cesar has authored several white papers on database and application security as well as attacks and exploitation techniques based on his unique research. More recently he has conducted extensive research on the Internet of Things (IoT) and traffic control systems.