Webinar: Wireless Insider Threat + The SECDEF Memo – Hosted by SIGNAL Media

The deadline is rapidly approaching to comply with the SECDEF's regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs. Are you equipped to address these security concerns within your facility by September 30, 2024? Watch this webinar to find out. In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed light on the vulnerabilities that insiders exploit, whether…

Webinar: SECDEF Memo – Impacts on SCIF/SAPF Security

Following the Texiera leaks in 2023, the SECDEF issued a memo related to wireless device usage in SCIFs/SAPFs. The memo outlined new compliance deadlines to be met in line with the increased requirements for SCIF/SAPF security. Bastille partnered with RackTop Systems to dive into the memo, its implications, and examples of this type of security situation playing out in real life. In the webinar, Jeremy and Brett dive into the implications of the SECDEF Memo of June 30, 2023, in…

Webinar: Introduction to Wireless Threat Intelligence

In today’s ever-connected world, enterprise network connections are rarely, if ever, simple. With the significant presence of personal and portable devices in enterprise spaces, your network’s potential attack surface grows exponential. To address the risk introduced by unknown devices entering your organization, you need continuous visibility into all wireless activity within your space. This is where Wireless Threat Intelligence comes into play. Wireless Threat Intelligence provides this necessary wireless visibility to organizations. This not only allows for insight into wireless…

Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 2

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases. What you'll learn about threat categories as they relate to Bluetooth: Keystroke Injection Pairing Attacks Paired Attacks Implementation Flaws PLUS a showcase of some the new features in the latest version…

Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 1

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series Watch this webinar to learn more about the Bluetooth protocol and related vulnerabilities. As more and more devices use Bluetooth and BLE, the opportunity to find potential exploitations also increases. What you'll learn about threat categories as they relate to Bluetooth: Monitoring DoS Attacks Session Hijacking MitM Attacks PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other…

Continuous TSCM Update

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Executive Protection series. Watch the webinar to learn more about the benefits of continuous monitoring. Point in time bug sweeps are essentially rendered obsolete after they are completed. Continuous monitoring, on the other hand, allows for ongoing visibility into your wireless space in addition to extensive historical device activity data. What you'll learn about how to find: Rogue Wi-Fi access points and data ex-fil devices Rogue video and…

Wi-Fi Vulnerabilities

Bastille's Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Part 2 of our earlier discussion of Wi-Fi Vulnerabilities. Part I Part II What's Discussed In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to Wi-Fi Vulnerabilities such as: Authentication Cracking - WEP, WPS PIN, PMKID, 4-way Handshake, Password Spraying Client Attacks - PitM, Captive Portal, NetNTLM hash stealing, etc. Hacker…

RF Threats & Vulnerabilities: 2023 Update

Bastille's Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Cell Phone-based spyware attacks, current threats and vulnerabilities within RF systems, and recent research presented at the 2023 BlackHat and DEF CON events. RF vulnerabilities, if not properly addressed, can have far reaching impact across your organization. Whether an attacker is targeting personal devices, large data centers, critical infrastructure systems, or enterprises, no industry is immune…

Wireless Insider Threat

In our ever-connected world, wireless devices have transformed how we communicate. However, let's not forget that all technology is susceptible to insider threats, including wireless devices. In this talk, Shawnee Delaney will shed light on the vulnerabilities that insiders exploit, whether maliciously or carelessly. Our lead speaker is Shawnee Delaney, founder and CEO of Vaillance Group, a decorated clandestine officer, and insider threat expert. Shawnee's expertise within the area of security, particularly in insider threat, provides a unique perspective into…

Continuous TSCM

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Executive Protection series. Watch the webinar to learn more about securing your environment from unwanted and unauthorized radio emitting devices. What you'll learn about how to find: Rogue Wi-Fi access points and data ex-fil devices Rogue video and still-image cameras Bluetooth-based data harvesting devices Cellular voice, data and video ex-fil devices, which can bridge physical networks Industrial Control System jammers, blockers and signal interfering devices PLUS showcase some…