Resource Type: Webinars

Bastille FlyAway Kit – Portable Cellular & RF Based Cellular Based Threat Detection and Location

Learn how to Detect and Locate unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices at temporary sites such as forward deployed, conference/hotel, tent, and other remote locations.

Join Dr. Bob Baxley, CTO, Bastille for a discussion on how Bastille uses passive Software Defined Radio sensor arrays to provide situational awareness for temporary locations.

In this webinar, Dr. Bob Baxley will demonstration customer use cases from Defense and Civilian Agencies including how they:

Enforce Flexible ‘Cell Phone’ or device policy: Enforce no cell phone policy for a temporary or forward deployed facility, or use Bastille to enable a more flexible policy

Secure meeting areas: Detect transmitting electronic devices in secure meeting areas

Prevent voice and data exfiltration: Detect wireless devices and Red Alert Upon events such as Bluetooth Pairing

Scan tent sites, buildings and remote offices: Scan a room or building to understand the presence and location of all emitters/transmitters and building systems

Speaker:

Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Demos

See Demos of the Bastille system detecting Cell phones, IoT, Wi-Fi and Bluetooth devices such as wearables

OODA Executive Briefing on finding phones, wearables and gadgets through Cellular, Bluetooth, Bluetooth Low Energy and Wi-Fi device detection

TOPIC

No doubt about it, there are devices violating your policy inside your facility as we speak.

At least, there are if you are not checking for them.

This could include the inadvertent violation of policy by an employee who accidentally left a smart phone in a bag or wore a paired smart device to work by mistake. Or it could be an intentional attempt to eavesdrop on conversations and record them using a device in the facility, or to leverage paired devices to move data from inside a facility to a device outside.

Regardless of the scenario, if you are not monitoring for signals inside your facility you are asking for trouble.

This webinar will feature an executive level overview of the emerging counterintelligence threat to intelligence community missions via mobile device protocols, including insights into the tactics and techniques of adversaries and the mitigation measures defenders should put in place.

Speakers:

Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Bob Gourley, an award winning former CTO of the Defense Intelligence Agency and co-founder of the cyber risk consultancy OODA LLC

PLUS See Demos of the Bastille system detecting Bluetooth, Cellular and other devices.

Enforcing Device Policy with 24/7 Detection, Location, and Alerting

It’s a wireless world. Every agency has a Radio Frequency (RF) device policy. But policies without effective enforcement don’t work. In order to accomplish the mission, legitimate employees are carrying devices such as cell phones, wearables, smart watches, wireless cameras, tablets, hearing aids with BT or Bluetooth Low Energy (BLE) and Headsets.

Old “no devices anywhere” policies have stopped working. Security officers need to be able to exclude all wireless and cellular devices from some indoor spaces and allow authorized devices in other spaces. Or allow a device in until it misbehaves by connecting outside the secure space.

In this webinar we detail three customer use cases from Defense and Civilian Agencies including how they:

Enforce adaptable RF device policy

Geo-fence sensitive areas and alert if/when they are breached

Accurately locate known and unknown cell phones with or without Mobile Device Management (MDM)

Alert when approved devices violate policy

Detect and locate rogue devices

Integrate RF security solutions with their existing infrastructure (e.g. Splunk, Aruba, Cisco, AirWatch, PagerDuty)

Speaker:

Dr. Bob Baxley, Chief Engineer at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Host:

George Seffers, Director, Content Development and Executive Editor at SIGNAL Magazine.

PLUS See Demos of the Bastille system detecting Cell phones and Bluetooth devices.

Cellular Intrusion Detection – Executive Briefing

Dr. Bob Baxley and Jim Wressell will introduce the key capabilities and requirements for a complete Cellular Intrusion Detection system.

In this webinar you will learn:

  • Key Requirements for a Cellular Intrusion Detection system
  • When to Use Cellular Intrusion Detection: Use Cases from the Field
  • How 4th Generation Cellular Intrusion Detection systems differ from earlier solutions
  • PLUS See a Live Demo of the Bastille system detecting Cell phones and integrated with Aruba, PagerDuty, Splunk and Security Cameras

Managing BYOD Risk

Bring your own device (or BYOD) may be standard policy at your organization. But it is also a serious and unmanaged risk to the security of your corporate network, sensitive data and intellectual property. Join Bastille Networks and Security Ledger to learn how undetected cellular devices including smart phones can provide access to your sensitive IT assets and how forward looking firms are tapping new tools to identify, track and manage cellular and wireless devices in their environment.

In this webinar you will learn more about:

BYOD Cyber Risk

BYOD Gone Wrong

Managing BYOD Risk

Aite Group.gif
Panelists include:

Danielle Tierney, Senior Analyst, AITE Group (author of recent paper on Cellular Surveillance)

Dale “Woody” Wooden, Founder of Weathered Security

Dr. Bob Baxley, Chief Technology Officer, Bastille Networks

Moderated by Paul Roberts, Editor of The Security Ledger.

Best Practices for Cell Phone Compliance and Security in Capital Markets

Danielle Tierney, leading analyst at AITE Group financial will cover:

How regulations affect your compliance policy for cell phones

Best practices for staying ahead of the regulations

Security threats to your organization from unmonitored use of cellular devices

Discussion includes several high-profile cases that involved the use of cell phones in the workplace resulting in serious financial and reputation damage.

PLUS when you register the webinar you will receive access to Danielle’s latest report “Cellular Surveillance: A Vital Compliance and Security Component”.

Sign up to Watch our IoT Security Round Up

Topics

Most pressing risks facing organizations
Top wireless exposures for businesses
Examples of wireless intrusions in business
Where is law enforcement (including FBI, DHS, State Police, local) in terms of understanding wireless risk and wireless attack vectors when investigating crimes
Where is business in understanding wireless risk
Mitigating information security risks to businesses: most effective steps
Mitigating wireless risks to businesses: most effective steps businesses can take

Wireless MD: Addressing Wireless & RF Risk in Clinical Settings

Topics

Security risks in hospitals from RF device vulnerabilities

Recent attacks on hospital IT systems

How to find unauthorized or poorly configured wireless devices in hospitals

Lessons learned from “IoT insecurity” such as Mirai, Brickerbot attacks

Examples of medical device vulnerabilities:

Insulin pumps

Pacemakers

Wireless MD: Addressing Wireless & RF Risk in Clinical Settings

Topics

Security risks in hospitals from RF device vulnerabilities

Recent attacks on hospital IT systems

How to find unauthorized or poorly configured wireless devices in hospitals

Lessons learned from “IoT insecurity” such as Mirai, Brickerbot attacks

Examples of medical device vulnerabilities:

Insulin pumps

Pacemakers