TOPIC
No doubt about it, there are devices violating your policy inside your facility as we speak.
At least, there are if you are not checking for them.
This could include the inadvertent violation of policy by an employee who accidentally left a smart phone in a bag or wore a paired smart device to work by mistake. Or it could be an intentional attempt to eavesdrop on conversations and record them using a device in the facility, or to leverage paired devices to move data from inside a facility to a device outside.
Regardless of the scenario, if you are not monitoring for signals inside your facility you are asking for trouble.
This webinar will feature an executive level overview of the emerging counterintelligence threat to intelligence community missions via mobile device protocols, including insights into the tactics and techniques of adversaries and the mitigation measures defenders should put in place.
Speakers:
Dr. Bob Baxley, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech
Bob Gourley, an award winning former CTO of the Defense Intelligence Agency and co-founder of the cyber risk consultancy OODA LLC
PLUS See Demos of the Bastille system detecting Bluetooth, Cellular and other devices.