What are the Latest IoT threats to Network Security
Join Dr. Bob Baxley to learn about the latest security vulnerabilities affecting billions of everyday IoT devices.
Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine recently disclosed vulnerabilities in protocols used by IoT devices which hackers can use to bypass your security, gain access to your systems, and exfiltrate data and voice information.
Zigbee, LoRa, DECT are just some of the standard protocols used by IoT devices, often set to be turned on by default in addition to Wi-Fi and sometimes Cellular, plus the many proprietary protocols from IoT device manufacturers. While you may have solutions to detect and even locate Wi-Fi devices, very few have solutions to detect and locate the wide range of standard and less well-known proprietary protocols used by IoT devices entering facilities loaded with unauthorized software, networking and transmission capabilities.
- "Bastille Research: Latest IoT threats to your Network Security" - Webinar on Thursday, July 23rd at 10am PT / 1pm ET. Reserve your spot today
Presenter: Dr. Bob Baxley is the former Director of the Software Defined Radio Lab at Georgia Tech. During the webinar Dr. Baxley will demonstrate how to use passive Software Defined Radio sensor arrays to protect organizations against the top IoT threats for 2020 and the hundreds discovered in previous years.
Register for the Webinar and you will learn:
The Latest IoT threats to your Network Security 2020, which:
- Affect Billions of Devices
- Allow Hackers to use RF as a Vector for Cybercrime
- Affect All Networks and Locations
- Impact the Devices we use Everyday
- Disrupt our Networks, Buildings and National Infrastructure
How to use RF detection and location technologies to:
- Detect, Locate and Isolate Devices Vulnerable to Attack
- Integrate RF Security into your Security Infrastructure
- Geofence Sensitive Areas and Receive Alerts
- Conduct Forensic Analysis of Threats
- Tag Devices by Manufacturer
Protocols Covered:
- Zigbee
- DECT
- LoRA
- Proprietary peripheral protocols
- and other IoT protocols
Who should attend?
- Security Professionals (Physical, Cyber, SIGINT, TSCM)
- J2/6, G2/6, A2/6, N2/6
- Network Operations Professionals
- Intelligence, Surveillance and Reconnaissance, and Cyber Effects Operations
- Command, Control, Communications and Computer Systems (C4)
- Joint Staff Intelligence
- Information Dominance, Intelligence, Network Operations, Cyberspace Operations
Speaker:
- Dr. Bob Baxley, CTO and Head of the Bastille Research Threat Team at Bastille, is the former Director of the Software Defined Radio Lab at Georgia Tech (bio here)
- Tags:
- Bastille Threat Research
- Bob Baxley
- cybersecurity
- DECT
- Georgia Tech
- IoT devices
- LoRA
- National Vulnerability Database
- network security
- proprietary protocols
- RF as a vector for cybercrime
- security vulnerabilities
- Software Defined Radio Lab
- Software Defined Radio sensor arrays
- unauthorized software
- Zigbee
- Login to post comments