<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>ICIT (Institute for Critical Infrastructure Technology)</provider_name><provider_url>https://icitech.org</provider_url><author_name>ICIT</author_name><author_url>https://icitech.org/author/admin/</author_url><title>ICIT Fellow Perspective - Cybersecurity in the Age of Connected &#x201C;Things&#x201D; - ICIT (Institute for Critical Infrastructure Technology)</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="REea6Sl9pR"&gt;&lt;a href="https://icitech.org/cybersecurity-in-the-age-of-connected-things/"&gt;ICIT Fellow Perspective &#x2013; Cybersecurity in the Age of Connected &#x201C;Things&#x201D;&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://icitech.org/cybersecurity-in-the-age-of-connected-things/embed/#?secret=REea6Sl9pR" width="600" height="338" title="&#x201C;ICIT Fellow Perspective &#x2013; Cybersecurity in the Age of Connected &#x201C;Things&#x201D;&#x201D; &#x2014; ICIT (Institute for Critical Infrastructure Technology)" data-secret="REea6Sl9pR" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,l){"use strict";var e=!1,o=!1;if(l.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=0;o&lt;n.length;o++)n[o].style.display="none";for(o=0;o&lt;i.length;o++)if(r=i[o],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=l.createElement("a"),a=l.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,a.host===s.host)if(l.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=l.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://icitech.org/wp-content/uploads/2020/05/Pete-Cover.png</thumbnail_url><thumbnail_width>437</thumbnail_width><thumbnail_height>576</thumbnail_height><description>Pete Slade (ICIT Fellow and ThreatWarrior Founder and Chief Scientits) details:Threats to the Internet of Things, Why IoT Devices Pose Such a Threat, IoT Attack Vectors, The Necessity of Starting Security at the Manufacturing Level, The Inevitability of Attack and the Conundrum of Liability, How Legacy Cybersecurity is Insufficient to Secure the Modern Enterprise, and Strategies to Secure the Internet of Things.</description></oembed>
