Resource Type: Webinars

Preventing Data Exfiltration from Data Centers

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.

In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats.

WIDS – an introduction
Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment in security cameras, access control and other forms of perimeter security. 

Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen.

How can Bastille help?

Bastille can help you by displaying wireless devices as dots on a floor-plan map, accurately showing their location within a defined space. The system can also be configured to alert when a device is found where it shouldn’t be or suddenly moves to a restricted area, such as within a geo-fenced space – inside a data center. Better still, since all this is recorded, you can go back in time using our DVR function to see when and where a device first entered your secure data center.

Wireless Devices Located include:

  • Cell Phones: Individual phones located in real-time just by their cellular signal
  • Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human Performance Monitors and other tactical gear
  • Personal Medical Devices: e.g. Hearing aids
  • Laptops & Tablets
  • USB Cables with hidden Wi-Fi and Bluetooth data extraction capabilities
  • Any device emitting Cellular, Wi-Fi, Bluetooth or BLE

Top Data Center Use Cases include:

  • Enforce No Cell Phone Policy or Nuanced Wireless Device Policies
  • Detect Data Exfiltration by Cellular, Bluetooth, BLE or Wi-Fi
  • Locate Rogue Devices like Non-Authorized RF/Wireless Devices, Networks & Hotspots
  • WIDS Compliance for Federal Customers’ Data
  • Integrations with existing infrastructure e.g. Lenel, Genetec, Splunk, Palo Alto, Aruba, Cisco, Juniper and Axis

Speaker:

  • Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Bastille Technology Update

In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille’s range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices.

The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations.

In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced electronic device policies.

Dr. Baxley takes a deep dive into the Bastille GUI and the “clickology”. This includes how to find and isolate RF threats, and then use the DVR functionality to conduct analysis of how, when and where the offending device(s) first appeared in your facility, where else the device(s) have been and their activity levels.

What will you learn from the webinar?

  • Latest technical updates on Bastille
  • Recent RF threats seen by Bastille in the field
  • Update on Bastille Threat Signatures and Tag Policies
  • How to use Aruba, Splunk and Bastille to locate an “evil twin” device
  • How to track devices using the Bastille DVR
  • How our Massive Multi-Channel Demodulation technology can detect and decode all 79 Bluetooth channels
  • Bastille Ruggedized Outdoor Sensors
  • Integrations such as Aruba ClearPass, Cisco, and Lenel

Who should attend?

  • Security Professionals (Physical, Cyber, SIGINT, TSCM)
  • J2/6, G2/6, A2/6, N2/6
  • Network Operations Professionals
  • Intelligence, Surveillance and Reconnaissance, and Cyber Effects Operations
  • Command, Control, Communications and Computer Systems (C4)
  • Joint Staff Intelligence
  • Information Dominance, Intelligence, Network Operations, Cyberspace Operations
  • Speaker:

Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wireless Geofence Policy Enforcement

RF GEOFENCE BOUNDARY POLICY ENFORCEMENT WITH BASTILLE AND ARUBA

FEATURING: EVIL TWIN ATTACK DETECTION DEMO

Join our Brett Walkenhorst, Ph.D., and Aruba’s Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area.

With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can and cannot go, helping to ensure higher security.

Who Should Watch:

  • Heads of Security and Mobile Security
  • Physical Security Professionals

You Will Learn:

  • How to enable automated RF geofencing capabilities
  • How to detect RF violations within your facility or campus through geofencing
  • How to integrate Bastille with Aruba

Speakers:

Dr. Brett Walkenhorst, CTO at Bastille

Mathew George, Senior Technical Marketing Engineer at Aruba

Demos: During the Webinar see demos of integrations between Aruba and Bastille.

Securing Data Centers from Cellular, RF and Wireless Intrusion Threats

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.

In the webinar, Brett walks through the different types of wireless vulnerabilities from the field and how to use a Wireless Intrusion Detection System (WIDS) to increase your operational security and get ahead of wireless threats.

WIDS – an introduction
Wireless Intrusion Detection and Prevention systems provide heightened operational security for your data centers, building on your existing investment in security cameras, access control and other forms of perimeter security.

Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen.

How can Bastille help?

Bastille can help you by displaying wireless devices as dots on a floor-plan map, accurately showing their location within a defined space. The system can also be configured to alert when a device is found where it shouldn’t be or suddenly moves to a restricted area, such as within a geo-fenced space – inside a data center. Better still, since all this is recorded, you can go back in time using our DVR function to see when and where a device first entered your secure data center.

WIRELESS DEVICES LOCATED INCLUDE:

Cell Phones: Individual phones located in real-time just by their cellular signal

Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human Performance Monitors and other tactical gear

Personal Medical Devices: e.g. Hearing aids

Laptops & Tablets

USB Cables with hidden Wi-Fi and Bluetooth data extraction capabilities

Any device emitting Cellular, Wi-Fi, Bluetooth or BLE

Top Data Center Use Cases include:

Enforce No Cell Phone Policy or Nuanced Wireless Device Policies

Detect Data Exfiltration by Cellular, Bluetooth, BLE or Wi-Fi

Locate Rogue Devices like Non-Authorized RF/Wireless Devices, Networks & Hotspots

WIDS Compliance for Federal Customers’ Data

Integrations with existing infrastructure e.g. Lenel, Genetec, C•CURE, Splunk, Palo Alto, Aruba, Cisco, Juniper, MDM/UEMs (Mobile Iron, MaaS360, etc), Camera systems (Axis, Hikvision, etc)

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Electronic Device Detection Best Practices: Meeting the SECDEF Memo Deadline

The deadline is rapidly approaching to comply with the SECDEF’s regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs.

Key Topics:

Understanding the SECDEF memo and its implications for CNSI security

Best practices for detecting and managing personal and portable electronic devices within SCIFs and SAPFs

Advanced strategies to mitigate the risks posed by electronic devices to classified information

Compliance requirements and how to prepare your organization before the deadline

Whether you’re responsible for managing SCIFs, SAPFs, or safeguarding CNSI, this webinar will provide you with actionable insights.

Speakers:

Dr. Brett Walkenhorst, CTO at Bastille

Wireless Geofence Policy Enforcement Example

RF Geofence Boundary Policy Enforcement with Bastille and aruba

Featuring: Evil Twin Attack Detection Demo

Join our Brett Walkenhorst, Ph.D., and Aruba’s Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area.

With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can and cannot go, helping to ensure higher security.

Who Should Watch
  • Heads of Security and Mobile Security
  • Physical Security Professionals
You Will Learn
  • How to enable automated RF geofencing capabilities
  • How to detect RF violations within your facility or campus through geofencing
  • How to integrate Bastille with Aruba

Webinar: The SECDEF Compliance Deadline + Wireless Insider Threat

Are you equipped to address the SECDEF Compliance deadline of September 30, 2024? Watch this webinar to find out.

Brett Walkenhorst, CTO, Bastille

In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, cover the overlap of wireless insider threat and wireless threat intelligence in the context of the SECDEF Memo of June 30, 2023. This memo details compliance guidelines related to the use of personal wireless devices in SCIFs/SAPFs with a compliance deadline of September 30, 2024.

The speakers will cover the top 10 most pressing wireless insider threats in addition to providing apt mitigation strategies. With the approaching compliance deadline, awareness around both insider threat and wireless security is crucial to ensuring your facility’s security meets these new and evolving compliance standards.

Speakers:

Shawnee Delaney, Founder & CEO at Vaillance Group

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Webinar: Wireless Insider Threat + The SECDEF Memo – Hosted by SIGNAL Media

The deadline is rapidly approaching to comply with the SECDEF’s regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs. Are you equipped to address these security concerns within your facility by September 30, 2024? Watch this webinar to find out.

Brett Walkenhorst, CTO, Bastille

In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed light on the vulnerabilities that insiders exploit, whether maliciously or carelessly, and dive into the field of insider threat in the context of the approaching compliance deadline.

George Seffers,
Moderator/Editor in Chief,
SIGNAL Magazine

The speakers will cover the top 10 most pressing wireless insider threats in addition to providing apt mitigation strategies. With the approaching compliance deadline, awareness around both insider threat and wireless security is crucial to ensuring your facility’s security meets these new and evolving compliance standards.

Speakers:

Shawnee Delaney, Founder & CEO at Vaillance Group

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Moderator:

George Seffers, Editor in Chief at SIGNAL Magazine

Webinar: SECDEF Memo – Impacts on SCIF/SAPF Security

Following the Texiera leaks in 2023, the SECDEF issued a memo related to wireless device usage in SCIFs/SAPFs. The memo outlined new compliance deadlines to be met in line with the increased requirements for SCIF/SAPF security. Bastille partnered with RackTop Systems to dive into the memo, its implications, and examples of this type of security situation playing out in real life.

Brett Walkenhorst, CTO, Bastille

In the webinar, Jeremy and Brett dive into the implications of the SECDEF Memo of June 30, 2023, in addition to providing some background on how both RackTop Systems and Bastille can help you comply with the security requirement detailed in the memo. They answer questions such as:

What is the SECDEF Memo of June 30, 2023 and how does it relate to wireless devices?

How can I ensure that my organization is in compliance with the wireless device security requirements detailed in the Memo?

How can both RackTop Systems and Bastille help my organization comply with these security requirements?

What are some examples of these kinds of security concerns playing out in the real world?

Speakers:

Jeremy Fremin, EVP Federal at RackTop Systems

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Webinar: Introduction to Wireless Threat Intelligence

In today’s ever-connected world, enterprise network connections are rarely, if ever, simple. With the significant presence of personal and portable devices in enterprise spaces, your network’s potential attack surface grows exponential. To address the risk introduced by unknown devices entering your organization, you need continuous visibility into all wireless activity within your space.

This is where Wireless Threat Intelligence comes into play. Wireless Threat Intelligence provides this necessary wireless visibility to organizations. This not only allows for insight into wireless activity within your space, but also for increased analytic capabilities through the use of historical data, thus allowing for better informed incident response plans and ultimately a more robust security posture for your organization.

In this webinar our CTO, Brett Walkenhorst, Ph.D., will answer questions such as:

What is “Wireless Threat Intelligence”?

Why is Wireless Threat Intelligence Relevant to My Organization?

How Does Bastille Help Organizations Address Their Wireless Threat Intelligence Needs at Various Levels?

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech