This is the story of how we successfully performed a comprehensive security assessment of an entire IoT ecosystem and mitigated threats surrounding them. The IoT product in question was a smart video doorbell that was susceptible to data and IP theft.