Posted on April 10, 2020 by Miranda -
Learn how to Detect and Locate unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices at temporary sites such as forward deployed, conference/hotel, tent, and other remote locations.
Join Dr. Bob Baxley, CTO, Bastille for a discussion on how Bastille uses passive Software Defined Radio sensor arrays to provide situational awareness for temporary locations.
In this webinar, Dr. Bob Baxley will demonstration customer use cases from Defense and Civilian Agencies including how they:
Enforce Flexible ‘Cell Phone’ or device policy: Enforce no cell phone policy for a temporary or forward deployed facility, or use Bastille to enable a more flexible policy
Secure meeting areas: Detect transmitting electronic devices in secure meeting areas
Prevent voice and data exfiltration: Detect wireless devices and Red Alert Upon events such as Bluetooth Pairing
Scan tent sites, buildings and remote offices: Scan a room or building to understand the presence and location of all emitters/transmitters and building systems
Speaker:
Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech
Demos
See Demos of the Bastille system detecting Cell phones, IoT, Wi-Fi and Bluetooth devices such as wearables
Posted on November 18, 2019 by FINAO Admin -
TOPIC
No doubt about it, there are devices violating your policy inside your facility as we speak.
At least, there are if you are not checking for them.
This could include the inadvertent violation of policy by an employee who accidentally left a smart phone in a bag or wore a paired smart device to work by mistake. Or it could be an intentional attempt to eavesdrop on conversations and record them using a device in the facility, or to leverage paired devices to move data from inside a facility to a device outside.
Regardless of the scenario, if you are not monitoring for signals inside your facility you are asking for trouble.
This webinar will feature an executive level overview of the emerging counterintelligence threat to intelligence community missions via mobile device protocols, including insights into the tactics and techniques of adversaries and the mitigation measures defenders should put in place.
Speakers:
Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech
Bob Gourley, an award winning former CTO of the Defense Intelligence Agency and co-founder of the cyber risk consultancy OODA LLC
PLUS See Demos of the Bastille system detecting Bluetooth, Cellular and other devices.
Posted on October 5, 2019 by FINAO Admin -
It’s a wireless world. Every agency has a Radio Frequency (RF) device policy. But policies without effective enforcement don’t work. In order to accomplish the mission, legitimate employees are carrying devices such as cell phones, wearables, smart watches, wireless cameras, tablets, hearing aids with BT or Bluetooth Low Energy (BLE) and Headsets.
Old “no devices anywhere” policies have stopped working. Security officers need to be able to exclude all wireless and cellular devices from some indoor spaces and allow authorized devices in other spaces. Or allow a device in until it misbehaves by connecting outside the secure space.
In this webinar we detail three customer use cases from Defense and Civilian Agencies including how they:
Enforce adaptable RF device policy
Geo-fence sensitive areas and alert if/when they are breached
Accurately locate known and unknown cell phones with or without Mobile Device Management (MDM)
Alert when approved devices violate policy
Detect and locate rogue devices
Integrate RF security solutions with their existing infrastructure (e.g. Splunk, Aruba, Cisco, AirWatch, PagerDuty)
Speaker:
Dr. Bob Baxley, Chief Engineer at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech
Host:
George Seffers, Director, Content Development and Executive Editor at SIGNAL Magazine.
PLUS See Demos of the Bastille system detecting Cell phones and Bluetooth devices.
Posted on June 20, 2019 by Miranda -
Dr. Bob Baxley and Jim Wressell will introduce the key capabilities and requirements for a complete Cellular Intrusion Detection system.
In this webinar you will learn:
- Key Requirements for a Cellular Intrusion Detection system
- When to Use Cellular Intrusion Detection: Use Cases from the Field
- How 4th Generation Cellular Intrusion Detection systems differ from earlier solutions
- PLUS See a Live Demo of the Bastille system detecting Cell phones and integrated with Aruba, PagerDuty, Splunk and Security Cameras
Posted on December 17, 2018 by FINAO Admin -
Bring your own device (or BYOD) may be standard policy at your organization. But it is also a serious and unmanaged risk to the security of your corporate network, sensitive data and intellectual property. Join Bastille Networks and Security Ledger to learn how undetected cellular devices including smart phones can provide access to your sensitive IT assets and how forward looking firms are tapping new tools to identify, track and manage cellular and wireless devices in their environment.
In this webinar you will learn more about:
BYOD Cyber Risk
BYOD Gone Wrong
Managing BYOD Risk
Aite Group.gif
Panelists include:
Danielle Tierney, Senior Analyst, AITE Group (author of recent paper on Cellular Surveillance)
Dale “Woody” Wooden, Founder of Weathered Security
Dr. Bob Baxley, Chief Technology Officer, Bastille Networks
Moderated by Paul Roberts, Editor of The Security Ledger.
Posted on October 25, 2018 by Miranda -
Danielle Tierney, leading analyst at AITE Group financial will cover:
How regulations affect your compliance policy for cell phones
Best practices for staying ahead of the regulations
Security threats to your organization from unmonitored use of cellular devices
Discussion includes several high-profile cases that involved the use of cell phones in the workplace resulting in serious financial and reputation damage.
PLUS when you register the webinar you will receive access to Danielle’s latest report “Cellular Surveillance: A Vital Compliance and Security Component”.
Posted on August 17, 2017 by Miranda -
Topics
Evolution of electronic surveillance detection
Why Cyber needs radio frequency security to be complete
How to do real-time bug detection
Posted on July 11, 2017 by FINAO Admin -
Topics
Most pressing risks facing organizations
Top wireless exposures for businesses
Examples of wireless intrusions in business
Where is law enforcement (including FBI, DHS, State Police, local) in terms of understanding wireless risk and wireless attack vectors when investigating crimes
Where is business in understanding wireless risk
Mitigating information security risks to businesses: most effective steps
Mitigating wireless risks to businesses: most effective steps businesses can take
Posted on June 5, 2017 by Miranda -
Topics
Security risks in hospitals from RF device vulnerabilities
Recent attacks on hospital IT systems
How to find unauthorized or poorly configured wireless devices in hospitals
Lessons learned from “IoT insecurity” such as Mirai, Brickerbot attacks
Examples of medical device vulnerabilities:
Insulin pumps
Pacemakers
Posted on June 5, 2017 by Miranda -
Topics
Security risks in hospitals from RF device vulnerabilities
Recent attacks on hospital IT systems
How to find unauthorized or poorly configured wireless devices in hospitals
Lessons learned from “IoT insecurity” such as Mirai, Brickerbot attacks
Examples of medical device vulnerabilities:
Insulin pumps
Pacemakers