Home > Speakers >

Natali Tshuva

Natali Tshuva brings over 10 years of experience, both as a researcher and a team leader, in the field of cyber security and software development. After graduating magna cum laude B.Sc. in Computer Science at the age of 19, as part of a special program for gifted and talented kids, Natali was handpicked to serve in IDF’s 8200 elite technology unit (the Israeli equivalent of MI6 or NSA) as a security software engineer. Prior to founding Sternum, Natali held several cybersecurity-related roles, including leading different R&D and research teams for global cyber intelligence market leaders. Having identified critical gaps in the IoT security market with life-saving consequences, Natali now leads all aspects of Sternum’s vision and mission execution both technologically and commercially. Natali holds an M.Sc. in Computer Science from Bar Ilan University and when she is in between meetings she rejuvenates with creative writing and all sorts of sports.

Outsmarting IoT Defense: The Hacker's Perspective

Status: Coming up in April 2023!

Endless patching is a race that cannot be won. To build sustainable, secure IoT solutions we must change that ineffective paradigm.

To appreciate what we can do differently, we should start by considering both the defender's and attacker's perspectives. This session will provide a unique view of that attacker's perspective, from former exploit/attack experts within the IDF Unit 8200. We will review the impossible task of identifying and mitigating all vulnerabilities - and will demonstrate the inadequacies of current IoT security practices focused on continuous patching, static analysis, encryption and risk controls. We will also explain how attackers can easily evade such barriers.

By contrast, the session will explore methods for achieving embedded, on-device runtime exploits protection to immunize devices from all underlying vulnerabilities, and provide zero-day protection as well. These methods, commonplace in IT endpoint detection and response, are just now finding their way into heretofore unprotected and unmanaged IoT edge devices.

Go to Session