Cyber threats are evolving—attackers no longer need to be physically close to breach your wireless network. The Nearest Neighbor Attack redefines proximity, allowing hackers to exploit dual-homed devices and neighboring networks to infiltrate your infrastructure.
As organizations become increasingly dependent on wireless connectivity, the risks of wireless-based cyber threats grow. One of the most concerning attacks today is the Nearest Neighbor Attack, which exploits the way devices connect and communicate over wireless networks. This webinar will delve into the security implications of this attack, its potential impact on government and enterprise environments, and the strategies organizations can deploy to mitigate the risks.
What You’ll Learn
- What is the Nearest Neighbor Attack and How does it work?
- What was the real-world incident that exposed this new risk?
- What are the key defense strategies to secure your organization?
Speakers
Ken Rich, CTO Federal
Ken has over 20 years in Defense, Intelligence and Civilian government markets. As the CTO for the HPE Networking Federal business unit, Ken plays a critical role in developing customer solutions and influencing future product direction.
Brett Walkenhorst, Ph.D., CTO
Brett leads the R&D efforts at Bastille. He was formerly with Raytheon Technologies, Silvus Technologies, NSI-MI Technologies, GTRI, and Lucent Bell Labs leading and conducting research in various RF topics.
Ideal Audience
- Security Professional (Physical, Cyber, SIGINT, TSCM)
- J2/6, G2/6, A2/6, N2/6
- Network Operations Professional
- Intelligence, Surveillance and Reconnaissance, and Cyber Effects Operations
- Command, Control, Communications and Computer Systems (C4)
- Joint Staff Intelligence
- Information Dominance, Intelligence, Network Operations, Cyberspace Operations