Dr. Bob Baxley and Jim Wressell will introduce the key capabilities and requirements for a complete Cellular Intrusion Detection system. In this webinar you will learn: Key Requirements for a Cellular Intrusion Detection system When to Use Cellular Intrusion Detection: Use Cases from the Field How 4th Generation Cellular Intrusion Detection systems differ from earlier solutions PLUS See a Live Demo of the Bastille system detecting Cell phones and integrated with Aruba, PagerDuty, Splunk and Security Cameras
Archives: Resources
Managing BYOD Risk
Bring your own device (or BYOD) may be standard policy at your organization. But it is also a serious and unmanaged risk to the security of your corporate network, sensitive data and intellectual property. Join Bastille Networks and Security Ledger to learn how undetected cellular devices including smart phones can provide access to your sensitive IT assets and how forward looking firms are tapping new tools to identify, track and manage cellular and wireless devices in their environment. In this…
Best Practices for Cell Phone Compliance and Security in Capital Markets
Danielle Tierney, leading analyst at AITE Group financial will cover: How regulations affect your compliance policy for cell phones Best practices for staying ahead of the regulations Security threats to your organization from unmonitored use of cellular devices Discussion includes several high-profile cases that involved the use of cell phones in the workplace resulting in serious financial and reputation damage. PLUS when you register the webinar you will receive access to Danielle's latest report "Cellular Surveillance: A Vital Compliance and…
Counter Surveillance for Cybersecurity Professionals
Topics Evolution of electronic surveillance detection Why Cyber needs radio frequency security to be complete How to do real-time bug detection
Bastille IoT Security Round Up
Topics Most pressing risks facing organizations Top wireless exposures for businesses Examples of wireless intrusions in business Where is law enforcement (including FBI, DHS, State Police, local) in terms of understanding wireless risk and wireless attack vectors when investigating crimes Where is business in understanding wireless risk Mitigating information security risks to businesses: most effective steps Mitigating wireless risks to businesses: most effective steps businesses can take
Wireless MD: Addressing Wireless & RF Risk in Clinical Settings
Topics Security risks in hospitals from RF device vulnerabilities Recent attacks on hospital IT systems How to find unauthorized or poorly configured wireless devices in hospitals Lessons learned from "IoT insecurity" such as Mirai, Brickerbot attacks Examples of medical device vulnerabilities: Insulin pumps Pacemakers
Wireless MD: Addressing Wireless & RF Risk in Clinical Settings
Topics Security risks in hospitals from RF device vulnerabilities Recent attacks on hospital IT systems How to find unauthorized or poorly configured wireless devices in hospitals Lessons learned from "IoT insecurity" such as Mirai, Brickerbot attacks Examples of medical device vulnerabilities: Insulin pumps Pacemakers
Cellular and IoT on Wall Street: Changes in Compliance Requirements, Cellular and IoT Devices in Capital Markets
Topics Key Compliance and Security Issues for 2017 and 2018 Changing Compliance Requirements in the US and EU New generation of cyber security threats from the Internet of Things Technologies available to assist with responses to regulators
Top IoT Attacks of 2016
Topics Review the top IoT attacks of 2016 How these attacks were executed What the implications of these attacks are for the Enterprise The best strategies for mitigating these threats in 2017
Who let the IoT in?
Topics DDoS / Dyn Attack Internet of Radios Security Issues Enterprise Security