John, memory safety vulnerabilities remain a major security risk for OT systems and embedded devices, with exploits like buffer overflows threatening reliability across industries. This session will explore real-world memory safety weaknesses, analyzing CVEs, attack techniques, and their impact on supply chains.
We’ll review global guidance from the NSA, CISA, and the EU, highlighting why rewriting software in memory-safe languages isn’t always feasible. Instead, we’ll showcase practical mitigation strategies, including real-time exploit detection and runtime protection, to defend against both known and zero-day threats—without modifying source code.
Key Takeaways: - Explore real-world memory safety weaknesses: Memory safety flaws in OT/embedded systems remain a major security risk.
- Review global memory safety guidance from the NSA, CISA, and the EU: Despite the guidance, rewriting code in memory-safe languages isn’t always feasible.
- Learn practical mitigation strategies: Real-time exploit detection and runtime protection mitigate memory safety vulnerabilities—without modifying source code.
|