Archives: Resources

Webinar: Wireless Insider Threat + The SECDEF Memo – Hosted by SIGNAL Media

The deadline is rapidly approaching to comply with the SECDEF’s regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs. Are you equipped to address these security concerns within your facility by September 30, 2024? Watch this webinar to find out.

Brett Walkenhorst, CTO, Bastille

In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed light on the vulnerabilities that insiders exploit, whether maliciously or carelessly, and dive into the field of insider threat in the context of the approaching compliance deadline.

George Seffers,
Moderator/Editor in Chief,
SIGNAL Magazine

The speakers will cover the top 10 most pressing wireless insider threats in addition to providing apt mitigation strategies. With the approaching compliance deadline, awareness around both insider threat and wireless security is crucial to ensuring your facility’s security meets these new and evolving compliance standards.

Speakers:

Shawnee Delaney, Founder & CEO at Vaillance Group

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Moderator:

George Seffers, Editor in Chief at SIGNAL Magazine

Webinar: SECDEF Memo – Impacts on SCIF/SAPF Security

Following the Texiera leaks in 2023, the SECDEF issued a memo related to wireless device usage in SCIFs/SAPFs. The memo outlined new compliance deadlines to be met in line with the increased requirements for SCIF/SAPF security. Bastille partnered with RackTop Systems to dive into the memo, its implications, and examples of this type of security situation playing out in real life.

Brett Walkenhorst, CTO, Bastille

In the webinar, Jeremy and Brett dive into the implications of the SECDEF Memo of June 30, 2023, in addition to providing some background on how both RackTop Systems and Bastille can help you comply with the security requirement detailed in the memo. They answer questions such as:

What is the SECDEF Memo of June 30, 2023 and how does it relate to wireless devices?

How can I ensure that my organization is in compliance with the wireless device security requirements detailed in the Memo?

How can both RackTop Systems and Bastille help my organization comply with these security requirements?

What are some examples of these kinds of security concerns playing out in the real world?

Speakers:

Jeremy Fremin, EVP Federal at RackTop Systems

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Webinar: Introduction to Wireless Threat Intelligence

In today’s ever-connected world, enterprise network connections are rarely, if ever, simple. With the significant presence of personal and portable devices in enterprise spaces, your network’s potential attack surface grows exponential. To address the risk introduced by unknown devices entering your organization, you need continuous visibility into all wireless activity within your space.

This is where Wireless Threat Intelligence comes into play. Wireless Threat Intelligence provides this necessary wireless visibility to organizations. This not only allows for insight into wireless activity within your space, but also for increased analytic capabilities through the use of historical data, thus allowing for better informed incident response plans and ultimately a more robust security posture for your organization.

In this webinar our CTO, Brett Walkenhorst, Ph.D., will answer questions such as:

What is “Wireless Threat Intelligence”?

Why is Wireless Threat Intelligence Relevant to My Organization?

How Does Bastille Help Organizations Address Their Wireless Threat Intelligence Needs at Various Levels?

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 2

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities – Part 2.”

Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases.

In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth:

Keystroke Injection

Pairing Attacks

Paired Attacks

Implementation Flaws

PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other protocols

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 1

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities – Part 1.”

Watch this webinar to learn more about the Bluetooth protocol and related vulnerabilities. As more and more devices use Bluetooth and BLE, the opportunity to find potential exploitations also increases.

In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth:

Monitoring

DoS Attacks

Session Hijacking

MitM Attacks

PLUS a showcase of some the new features in the latest version of Bastille for Bluetooth and other protocols

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Continuous TSCM Update

Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Executive Protection series.

Watch the webinar to learn more about the benefits of continuous monitoring. Point in time bug sweeps are essentially rendered obsolete after they are completed. Continuous monitoring, on the other hand, allows for ongoing visibility into your wireless space in addition to extensive historical device activity data.

In this webinar our CTO, Brett Walkenhorst, Ph.D., will discuss how to find:

  • Rogue Wi-Fi access points and data ex-fil devices
  • Rogue video and still-image cameras
  • Bluetooth-based data harvesting devices
  • Cellular voice, data and video ex-fil devices, which can bridge physical networks
  • Industrial Control System jammers, blockers and signal interfering devices
  • PLUS showcase some of the new features in the latest version of Bastille
  • Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wi-Fi Vulnerabilities

Part 2

Bastille’s Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Part 2 of our earlier discussion of Wi-Fi Vulnerabilities.

In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to Wi-Fi Vulnerabilities such as:

Authentication Cracking – WEP, WPS PIN, PMKID, 4-way Handshake, Password Spraying

Client Attacks – PitM, Captive Portal, NetNTLM hash stealing, etc.

Hacker Devices – Wi-Fi Pineapple, O.MG Cable, Wi-Fi USB Rubber Ducky, etc.

This threat of Wi-Fi Vulnerabilities often remains unseen by physical security due to the wireless nature of RF. However, Wi-Fi Vulnerabilities exploited by a malicious actor can compromise your organization’s security, thus necessitating the need for increased awareness and preparedness surrounding the range of current Wi-Fi Vulnerabilities.

In the webinar Dr. Walkenhorst details the current landscape of Wi-Fi Vulnerabilities, and provides techniques on how to mitigate this threat, including:

Monitoring for Suspicious Devices

Policies and Training for Employees

Best Practices for your Wi-Fi networks and devices

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

RF Threats & Vulnerabilities: 2023 Update

Bastille’s Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Cell Phone-based spyware attacks, current threats and vulnerabilities within RF systems, and recent research presented at the 2023 BlackHat and DEF CON events.

In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to RF Vulnerabilities such as:

Cell phone spyware

Vulnerabilities within RF systems

Mitigation strategies

Security best practices

RF vulnerabilities, if not properly addressed, can have far reaching impact across your organization. Whether an attacker is targeting personal devices, large data centers, critical infrastructure systems, or enterprises, no industry is immune from wireless threats. This is why staying up to date with the current landscape of RF Threats and Vulnerabilities is a critical step in maintaining the wireless security of your devices and your organization.

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wireless Insider Threat

In our ever-connected world, wireless devices have transformed how we communicate. However, let’s not forget that all technology is susceptible to insider threats, including wireless devices. In this talk, Shawnee Delaney will shed light on the vulnerabilities that insiders exploit, whether maliciously or carelessly.

Brett Walkenhorst, CTO, Bastille

Our lead speaker is Shawnee Delaney, founder and CEO of Vaillance Group, a decorated clandestine officer, and insider threat expert. Shawnee’s expertise within the area of security, particularly in insider threat, provides a unique perspective into the ways in which an organization may fall victim to an insider attack.

Shawnee will be joined by Bastille CTO Dr. Brett Walkenhorst as they discuss the Top 10 Wireless Insider Threats such as:

Unauthorized Access

Data Theft

Malicious Firmware Changes

Disruption of Operations

And More…

Wireless Insider Threats are real, and so too are the solutions. In this webinar, Shawnee will also detail strategies to mitigate these vulnerabilities including:

Smart Access Controls

Security Training

Strong Authentication Methods

Robust Incident Response Plans

And More…

Speakers:

Shawnee Delaney, Founder & CEO at Vaillance Group

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Wi-Fi Vulnerabilities

Part 1

Bastille’s Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Wi-Fi Vulnerabilities.

In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to Wi-Fi Vulnerabilities such as:

Wi-Fi Monitoring Threats – Beacons, Directed Probe Requests, Eavesdropping, Wardriving

Denial of Service – Deauthentication, Beacon Flooding, RTS Flood, etc

Rogue AP / Evil Twin – Open Hotspot, Handshake Crack, EAP Relay, KARMA/MANA

Wi-Fi Vulnerabilities exploited by a malicious actor can compromise your organization’s security. Despite the clear and present danger posed by unaddressed Wi-Fi Vulnerabilities, they go largely unmonitored until a breach occurs, and by then it is too late. This threat often remains unseen by physical security due to the wireless nature of RF.

In the webinar Dr. Walkenhorst details the current landscape of Wi-Fi Vulnerabilities, and provides techniques on how to mitigate this threat, including:

Monitoring for Suspicious Devices

Policies and Training for Employees

Best Practices for your Wi-Fi networks and devices

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech