Join our CTO, Brett Walkenhorst, Ph.D., and Aaron Gosney, Director of Field Engineering, to learn more about improving Wireless Threat Intelligence for your Cloud Infrastructure.
Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Cloud Infrastructure security.
In the webinar we cover Data Exfiltration techniques such as:
Rogue Wi-Fi access points and data ex-fil devices
Rogue cameras
Bluetooth-based data harvesting devices
Cellular voice, data and video ex-fil devices, which can bridge physical networks
Industrial Control System jammers, blockers and signal interfering devices
Any one of these threats can impact system stability, deny access to or steal data from applications, or compromise the integrity of the cloud infrastructure.
Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen by physical security.
Dr. Walkenhorst will also cover Data Exfiltration prevention techniques including:
Geofencing Cloud Infrastructure to Detect and Alert on intruding wireless devices
Enforcing a No Cell Phone Policy or Using a Nuanced Wireless Device Policy
Detecting Data Exfiltration by Cellular, Bluetooth, BLE, Wi-Fi or IoT devices
Locating Rogue Devices: Non-authorized RF/wireless devices, networks & hotspots
Speakers:
Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech
Aaron Gosney, Director of Field Engineering, Bastille