Resource Type: Webinars

Bastille Technology Update

In this technology update webinar Dr. Brett Walkenhorst, CTO at Bastille, covers the latest features in Bastille’s range of Wireless Threat Detection solutions for detecting, locating and responding to unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices.

The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations.

What will you learn from the webinar?
– Latest technical updates on Bastille
– Recent RF threats seen by Bastille in the field
– Update on Bastille Threat Signatures and Tag Policies
– How our Massive Multi-Channel Demodulation technology can detect and decode all 79 Bluetooth channels
– Bastille Ruggedized Outdoor Sensors
– Our latest integrations

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Bastille Technology Update

In this technology update webinar Dr. Bob Baxley covers the latest features in Bastille’s range of solutions for detecting and locating unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices.

The webinar includes both Bastille Enterprise for permanent deployments, and the Bastille FlyAway Kit, our portable tactical solution, plus our new ruggedized solution for outdoor locations.

In this webinar Dr. Baxley provides updates on the current technologies available to security professionals as they seek to effectively implement and enforce more nuanced electronic device policies.

Dr. Baxley takes a deep dive into the Bastille GUI and the “clickology”. This includes how to find and isolate RF threats, and then use the DVR functionality to conduct analysis of how, when and where the offending device(s) first appeared in your facility, where else the device(s) have been and their activity levels.

What will you learn from the webinar?

Latest technical updates on Bastille

Recent RF threats seen by Bastille in the field

Update on Bastille Threat Signatures and Tag Policies

How to use Aruba, Splunk and Bastille to locate an “evil twin” device

How to track devices using the Bastille DVR

How our Massive Multi-Channel Demodulation technology can detect and decode all 79 Bluetooth channels

Bastille Ruggedized Outdoor Sensors

Integrations such as Aruba ClearPass, Cisco, and Lenel

Who should attend?

Security Professionals (Physical, Cyber, SIGINT, TSCM)

J2/6, G2/6, A2/6, N2/6

Network Operations Professionals

Intelligence, Surveillance and Reconnaissance, and Cyber Effects Operations

Command, Control, Communications and Computer Systems (C4)

Joint Staff Intelligence

Information Dominance, Intelligence, Network Operations, Cyberspace Operations

Speaker:

Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Cellular Vulnerabilities and Exploitations, 2G to 5G and Beyond… Part 1

The Bastille Research webinar series aims to educate security professionals about the risks and vulnerabilities in RF devices and protocols. In this webinar we cover security vulnerabilities discovered in cellular protocols.

Dr. Altaf Shaik from the Technical University of Berlin and Bastille, CTO Dr. Brett Walkenhorst review historical application layer, interconnect, and IMSI catchers. We also explore the value of wireless monitoring for real-time alerting and forensic analysis to help mitigate the impact of some of these threats.

In this webinar you will learn:

Historical Cellular Vulnerabilities

Application Layer

Interconnects (SS7, Diameter nodes)

Radio/Baseband Layer (IMSI catchers, others)

IMSI catchers

Bringing Visibility to the Wireless Attack Surface

Speakers:

Dr. Altaf Shaik is a senior research scientist at the Technische Universität Berlin in Germany, and conducts advanced research in telecommunications especially, in 6G security architecture, openRAN, and 5G radio access and core network security. He has more than 12 years of experience in Telecom security and combines a professional background in embedded programming, wireless communications, and offensive network security. Dr. Shaik spent his career as a security engineer and expert at various leading telecommunication companies including Gemalto (currently Thales), Deutsche Telekom, and Huawei Technologies.

His research assisted in improving the 3GPP 4G security standards and exposed several vulnerabilities in commercial mobile networks affecting millions of base stations, networks, and handsets worldwide. Recently he also exposed vulnerabilities in the telecom APIs and 5G slice authentication leading to serious attacks.

Dr. Shaik is a frequent speaker at various prestigious international security conferences such as Blackhat USA & Europe, T2, SECT, Nullcon, Hardware.io and HITB, and many others. His accomplishments landed him in the hall of fame of organizations like Google, Qualcomm, Huawei, and GSMA. He is also the founder of Kaitiaki labs and FastIoT that trains internationally various companies and governmental organizations in exploit development and also building secure mobile and IoT networks including their testing and security assessment. View LinkedIn Profile.

Dr. Brett Walkenhorst has over 20 years of experience as a technology leader in RF systems and signal processing. Prior to Bastille, he led and executed R&D efforts at Lucent Bell Labs, GTRI, NSI-MI Technologies, Silvus Technologies, and Raytheon Technologies. He is a senior member of IEEE and has served as the Chair of the Atlanta Chapter of the IEEE Communications Society. View LinkedIn Profile.

Register to Watch

Continuous TSCM

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your environment from unwanted and unauthorized radio emitting devices.

Watch the webinar to learn about the latest techniques in Continuous Technical Surveillance and Countermeasures.

Three things you will learn from the Webinar:

  • How to detect and locate wireless devices
  • Key challenges facing TSCM professionals
  • Latest TSCM features in Bastille

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Cellular, Bluetooth, Wi-Fi, IoT Spyware and Vulnerabilities Update 2022

PLUS DEF CON AND BLACK HAT UPDATES

In this webinar Dr. Walkenhorst provides updates on the now infamous Pegasus Spyware affecting billions of cell phones. In addition he reviews the latest RF vulnerabilities presented at Black Hat and DEF CON, including:

  • 4G/5G API Vulnerabilities
  • New Attack Surfaces of BLE Mesh
  • Wireless Keystroke Injection via BLE
  • Low-Level Router Vulnerabilities
  • PIPEDREAM
  • Automotive Rollback Attack

Speaker:

Dr. Brett Walkenhorst has over 20 years of experience as a technology leader in RF systems and signal processing. Prior to Bastille, he led and executed R&D efforts at Lucent Bell Labs, GTRI, NSI-MI Technologies, Silvus Technologies, and Raytheon Technologies. He is a senior member of IEEE and has served as the Chair of the Atlanta Chapter of the IEEE Communications Society. View LinkedIn Profile.

Register to Watch

Wireless Intrusion Detection Location and Alerting

In this webinar with Carahsoft, Dr. Brett Walkenhorst, Bastille’s CTO provides an Executive Briefing on how detecting cell phones, Bluetooth wearables and RF gadgets becomes reality with Bastille.

Bastille’s real-time Cellular, Bluetooth, BLE and Wi-Fi detection and location system locates all authorized and unauthorized devices within a campus or forward deployed location.

Wireless Devices Located include:

  • Cell Phones: Individual phones located in real-time just by their cellular signal
  • Wearables: e.g. Smart watches such as Garmin Fenix, FitBit and Biometric Human Performance Monitors and other tactical gear
  • Personal Medical Devices: e.g. Hearing aids
  • Laptops & Tablets
  • USB Cables with hidden Wi-Fi and Bluetooth data extraction capabilities
  • Any device emitting cellular, Wi-Fi, Bluetooth or BLE

Top Use Cases include:

  • Enforce No Cell Phone Policy or Nuanced Wireless Device Policies
  • Detect Data Exfiltration by Cellular, Bluetooth, BLE or Wi-Fi
  • Locate Rogue Devices like Non-Authorized RF/Wireless Devices, Networks & Hotspots
  • WIDS Compliance for Federal Customers’ Data
  • Integrations with existing infrastructure e.g. Lenel, Genetec, Splunk, Palo Alto, Aruba, Cisco, Juniper, MDM/UEMs (Mobile Iron, MaaS360, etc), Camera systems (Axis, Hikvision, etc)

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille

Complete Form to be Taken to the Webinar Recording:

Get Rid of Your Shadow-IT and Radio Frequency (RF) Network Blindness

RF GEOFENCE BOUNDARY POLICY ENFORCEMENT WITH BASTILLE AND ARUBA

Join our Brett Walkenhorst, Ph.D., and Aruba’s Mathew George to learn how enabling automated RF geofencing capabilities can alert you of any RF violations within your protected area.

With the steady increase in both consumer and enterprise devices communicating via radio, it is important to have full visibility into every device in your facility. Creating a geofence boundary can help regulate where these devices can and cannot go, helping to ensure higher security.

Who Should Watch:

Heads of Security and Mobile Security

Physical Security Professionals

You Will Learn:

How to enable automated RF geofencing capabilities

How to detect RF violations within your facility or campus through geofencing

How to integrate Bastille with Aruba

Speakers:

Dr. Brett Walkenhorst, CTO at Bastille

Mathew George, Senior Technical Marketing Engineer at Aruba

Demos: During the Webinar see demos of integrations between Aruba and Bastille.

Securing Data Centers from Cellular, RF and Wireless Intrusion Threats

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.

Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Data Center security.

In the webinar we cover Data Exfiltration techniques such as:

Rogue Wi-Fi access points and data ex-fil devices

Rogue cameras

Bluetooth-based data harvesting devices

Cellular voice, data and video ex-fil devices, which can bridge physical networks

Industrial Control System jammers, blockers and signal interfering devices

Any one of these threats can impact system stability, deny access to or steal data from applications, or compromise the integrity of the cloud infrastructure.

Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen by physical security.

Dr. Walkenhorst will also cover Data Exfiltration prevention techniques including:

Geofencing Data Centers to Detect and Alert on intruding wireless devices

Enforcing a No Cell Phone Policy or Using a Nuanced Wireless Device Policy

Detecting Data Exfiltration by Cellular, Bluetooth, BLE, Wi-Fi or IoT devices

Locating Rogue Devices: Non-authorized RF/wireless devices, networks & hotspots

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Cell Phone Spyware and Vulnerabilities Update

SPYWARE AND USB CABLES

Cell Phone Spyware and Vulnerabilities Update
In this webinar Dr. Baxley will update you on the latest on the Pegasus Cell Phone Spyware, which affects billions of devices. Dr. Baxley will also review our own research into the variety of Cell Phone Spyware vendors and capabilities. Plus, he will review findings from our recent Cell Phone Spyware survey.

While the news about Pegasus Spyware focused on the individuals whose phones were hacked, the real story is the organizational secrets that were revealed because innocent people carried spy devices (their phones) into classified conversations.

Cell Phone Spyware hit the headlines again recently, with news that Spyware has been found on cell phones used by the US State Dept.

The latest spyware versions send a message to the phone that the user never sees. It arrives with no notification and gives itself its own permission to install the spyware without the user’s knowledge – meaning any employee no matter how loyal or security conscious can be a vehicle for carrying spyware into your most secret facilities and meeting rooms.

This is why enterprises and government agencies must not simply brush this off as a “it couldn’t happen here” scenario. It can happen anywhere!

Even worse “Turning off your phone” won’t work. Modern cell phones are never really off. They are in different states of hibernation and spyware can wake them up when it wants. What’s the fix? Sadly, the only answer is to keep cell phones out of your most classified meetings, which is where Bastille can help.

PLUS learn how your USB Cable may really be a Spyware device…..

Speaker:

Dr. Bob Baxley, CTO and co-founder, Bastille (bio here). Prior to Bastille, Bob was the Director of the Software Defined Radio Lab at Georgia Tech, where he led basic and applied research projects for organizations including NSF, ONR, Army, DoD, Air Force, and DARPA.

Cellular, Bluetooth, Wi-Fi, IoT Spyware and Vulnerabilities Update 2021

PEGASUS SPYWARE, DEF CON AND BLACK HAT UPDATES

Cellphone Spyware and Vulnerabilities Update
In this webinar Dr. Bob Baxley, CTO and head of the Bastille Threat Research Team explains how hackers use the Pegasus cellphone spyware and other vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Dr. Baxley will also review the latest RF vulnerabilities presented at Black Hat and DEF CON.

While the news about Pegasus Spyware focused on the individuals whose phones were hacked, the real story is the organizational secrets that were revealed because innocent people carried spy devices (their phones) into classified conversations.

The latest spyware versions send a message to the phone that the user never sees. It arrives with no notification and gives itself its own permission to install the spyware without the user’s knowledge – meaning any employee no matter how loyal or security conscious can be a vehicle for carrying spyware into your most secret facilities and meeting rooms.

This is why enterprises and government agencies must not simply brush this off as a “it couldn’t happen here” scenario. It can happen anywhere!

Even worse “Turning off your phone” won’t work. Modern cell phones are never really off. They are in different states of hibernation and spyware can wake them up when it wants. What’s the fix? Sadly, the only answer is to keep cell phones out of your most classified meetings, which is where Bastille can help.

Speaker:

Dr. Bob Baxley, CTO and co-founder, Bastille (bio here). Prior to Bastille, Bob was the Director of the Software Defined Radio Lab at Georgia Tech, where he led basic and applied research projects for organizations including NSF, ONR, Army, DoD, Air Force, and DARPA.