CISO Panel: Cybersecurity Strategy and Emerging Threats
This panel discussion features four Chief Information Security Officers (CISOs) sharing their perspectives on current cybersecurity challenges, including the impact of AI and quantum computing on organizational security. The speakers emphasize the importance of maintaining a balanced risk-based approach, fostering a culture of healthy skepticism, and prioritizing fundamental security practices. The conversation also touches on the evolving threat landscape, the necessity of effective communication, and the strategic integration of emerging technologies into security programs.
Beyond the CISO Dashboard: Why Your IoT and Social Footprint Are the Real Attack Surface
TLDR: Modern enterprise security is no longer just about patching servers and managing firewalls. This panel discussion highlights how personal data leakage via platforms like Strava and the ubiquity of insecure IoT devices like Google Home create massive, unmonitored entry points for attackers. Pentesters should pivot their focus toward these non-traditional vectors, as they often bypass traditional perimeter defenses entirely.
Security teams spend millions on endpoint detection and response, yet the most effective way to compromise an executive or a high-value target often involves nothing more than a public fitness tracker or a smart speaker. The recent CISO panel at Security BSides 2025 made one thing clear: the perimeter is dead, and the new attack surface is wherever your employees live, run, and talk.
The Reality of the Expanded Attack Surface
Traditional penetration testing often focuses on the "crown jewels"—the databases, the cloud infrastructure, and the internal network. However, the panelists emphasized that attackers are increasingly looking at the human element and the connected devices that surround them. When a high-ranking official uses a fitness app that logs their daily running route, they are effectively broadcasting the perimeter of a secure facility to anyone with a Strava account. This is not a theoretical risk; it is T1592 in action, where an adversary gathers victim organization information through open-source intelligence.
The technical reality is that these devices are rarely hardened. They are designed for convenience, not security. When you combine the data leakage from social media with the lack of authentication on many IoT devices, you get a perfect storm for A07:2021-Identification and Authentication Failures. An attacker does not need to exploit a zero-day in your VPN if they can simply pivot through an insecure smart home device that shares a network with a corporate laptop.
The AI-Driven Threat Landscape
Artificial intelligence is changing the speed of reconnaissance. The panelists noted that attackers are using AI to automate the discovery of technical databases and to craft highly convincing phishing campaigns. If you are a researcher, you should expect to see more sophisticated T1566 phishing attempts that leverage context gathered from social media.
For example, an attacker can use AI to scrape a target’s public posts, identify their interests, and generate a spear-phishing email that is indistinguishable from a legitimate communication. The barrier to entry for this kind of attack has dropped significantly. You no longer need a team of social engineers; you just need a well-prompted model and access to public data.
Practical Steps for the Modern Pentester
If you are conducting an engagement, stop treating the "home office" as out of scope. During your next assessment, consider the following:
- OSINT on Key Personnel: Use T1593 to search open technical databases and social media. What information is available about the target’s habits? Are they using devices that broadcast their location or daily routine?
- IoT Network Mapping: If you have access to the internal network, perform a thorough scan for IoT devices. Are they using default credentials? Are they running outdated firmware? These devices are often the weakest link in the chain.
- Phishing Simulation: When designing your phishing payloads, use the information gathered from social media to increase your success rate. The more context you have, the more effective your campaign will be.
The Defensive Shift
Defenders need to move away from the "fortress" mentality. The panelists argued that the most effective defense is a combination of rigorous asset management and a culture of healthy skepticism. If a device cannot be secured, it should not be on the network. Furthermore, employees need to understand that their personal digital footprint is a corporate security risk.
Security is not just about the tools you deploy; it is about the visibility you have into the entire ecosystem. If you cannot see the device, you cannot secure it. The next time you are scoping a project, ask yourself: what is the most likely path an attacker will take? It probably won't be through the front door. It will be through the smart lightbulb in the CEO’s office or the fitness tracker on their wrist.
The future of security is about managing the chaos of a hyper-connected world. We are moving toward a reality where AI will be used both to attack and to defend, and the winners will be those who can adapt the fastest. Keep your tools sharp, keep your skepticism high, and never assume that a device is secure just because it is "smart."
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom




