Are you equipped to address the SECDEF Compliance deadline of September 30, 2024? Watch this webinar to find out. Brett Walkenhorst, CTO, Bastille In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, cover the overlap of wireless insider threat and wireless threat intelligence in the context of the SECDEF Memo of June 30, 2023. This memo details compliance guidelines related to the use of personal wireless devices in SCIFs/SAPFs with a compliance deadline of…
Archives: Resources
Webinar: Wireless Insider Threat + The SECDEF Memo – Hosted by SIGNAL Media
The deadline is rapidly approaching to comply with the SECDEF's regulations regarding the safeguarding of classified national security information (CNSI) from the threats posed by personal or portable electronic devices within SCIFs and SAPFs. Are you equipped to address these security concerns within your facility by September 30, 2024? Watch this webinar to find out. Brett Walkenhorst, CTO, Bastille In this webinar, insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed light on the vulnerabilities…
Webinar: SECDEF Memo – Impacts on SCIF/SAPF Security
Following the Texiera leaks in 2023, the SECDEF issued a memo related to wireless device usage in SCIFs/SAPFs. The memo outlined new compliance deadlines to be met in line with the increased requirements for SCIF/SAPF security. Bastille partnered with RackTop Systems to dive into the memo, its implications, and examples of this type of security situation playing out in real life. Brett Walkenhorst, CTO, Bastille In the webinar, Jeremy and Brett dive into the implications of the SECDEF Memo of…
Webinar: Introduction to Wireless Threat Intelligence
In today’s ever-connected world, enterprise network connections are rarely, if ever, simple. With the significant presence of personal and portable devices in enterprise spaces, your network’s potential attack surface grows exponential. To address the risk introduced by unknown devices entering your organization, you need continuous visibility into all wireless activity within your space. This is where Wireless Threat Intelligence comes into play. Wireless Threat Intelligence provides this necessary wireless visibility to organizations. This not only allows for insight into wireless…
Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 2
Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities - Part 2.” Watch this webinar to learn more about the Bluetooth protocol and its related vulnerabilities. With the steady increase in the everyday prevalence of both Bluetooth and BLE, the breadth of potential threat vectors also increases. In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth: Keystroke Injection Pairing Attacks Paired Attacks Implementation Flaws PLUS a…
Webinar: Vulnerability Series – Bluetooth Vulnerabilities – Part 1
Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Vulnerability Series, “Bluetooth Vulnerabilities - Part 1.” Watch this webinar to learn more about the Bluetooth protocol and related vulnerabilities. As more and more devices use Bluetooth and BLE, the opportunity to find potential exploitations also increases. In this webinar our Brett will discuss the following threat categories as they relate to Bluetooth: Monitoring DoS Attacks Session Hijacking MitM Attacks PLUS a showcase of some the new features…
Continuous TSCM Update
Join our CTO, Brett Walkenhorst, Ph.D., for the latest event in our Executive Protection series. Watch the webinar to learn more about the benefits of continuous monitoring. Point in time bug sweeps are essentially rendered obsolete after they are completed. Continuous monitoring, on the other hand, allows for ongoing visibility into your wireless space in addition to extensive historical device activity data. In this webinar our CTO, Brett Walkenhorst, Ph.D., will discuss how to find: Rogue Wi-Fi access points and…
Wi-Fi Vulnerabilities
Bastille's Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Part 2 of our earlier discussion of Wi-Fi Vulnerabilities. Part I Part II What's Discussed In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to Wi-Fi Vulnerabilities such as: Authentication Cracking - WEP, WPS PIN, PMKID, 4-way Handshake, Password Spraying Client Attacks - PitM, Captive Portal, NetNTLM hash stealing, etc. Hacker…
RF Threats & Vulnerabilities: 2023 Update
Bastille's Vulnerability Series educates security professionals on the ever-evolving risks and vulnerabilities present within wireless protocols. This installment in the Vulnerability Series focuses on Cell Phone-based spyware attacks, current threats and vulnerabilities within RF systems, and recent research presented at the 2023 BlackHat and DEF CON events. In this webinar, our CTO, Brett Walkenhorst, PhD, discusses a range of topics related to RF Vulnerabilities such as: Cell phone spyware Vulnerabilities within RF systems Mitigation strategies Security best practices RF vulnerabilities,…
Wireless Insider Threat
In our ever-connected world, wireless devices have transformed how we communicate. However, let's not forget that all technology is susceptible to insider threats, including wireless devices. In this talk, Shawnee Delaney will shed light on the vulnerabilities that insiders exploit, whether maliciously or carelessly. Brett Walkenhorst, CTO, Bastille Our lead speaker is Shawnee Delaney, founder and CEO of Vaillance Group, a decorated clandestine officer, and insider threat expert. Shawnee's expertise within the area of security, particularly in insider threat, provides…