What are the Latest IoT threats to Network Security

Event Details
July 23, 2020 - 1:00pm - 2:00pm

Join Dr. Bob Baxley to learn about the latest security vulnerabilities affecting billions of everyday IoT devices.

Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine recently disclosed vulnerabilities in protocols used by IoT devices which hackers can use to bypass your security, gain access to your systems, and exfiltrate data and voice information.

Zigbee, LoRa, DECT are just some of the standard protocols used by IoT devices, often set to be turned on by default in addition to Wi-Fi and sometimes Cellular, plus the many proprietary protocols from IoT device manufacturers. While you may have solutions to detect and even locate Wi-Fi devices, very few have solutions to detect and locate the wide range of standard and less well-known proprietary protocols used by IoT devices entering facilities loaded with unauthorized software, networking and transmission capabilities.

Dr. Bob BaxleyReserve your spot today - "Bastille Research: Latest IoT threats to your Network Security" - Webinar on Thursday, July 23rd at 10am PT / 1pm ET.

Presenter: Dr. Bob Baxley is the former Director of the Software Defined Radio Lab at Georgia Tech. During the webinar Dr. Baxley will demonstrate how to use passive Software Defined Radio sensor arrays to protect organizations against the top IoT threats for 2020 and the hundreds discovered in previous years.

Register for the Webinar and you will learn:

The Latest IoT threats to your Network Security 2020, which:

  • Affect Billions of Devices
  • Allow Hackers to use RF as a Vector for Cybercrime
  • Affect All Networks and Locations
  • Impact the Devices we use Everyday
  • Disrupt our Networks, Buildings and National Infrastructure

How to use RF detection and location technologies to:

  • Detect, Locate and Isolate Devices Vulnerable to Attack
  • Integrate RF Security into your Security Infrastructure
  • Geofence Sensitive Areas and Receive Alerts
  • Conduct Forensic Analysis of Threats
  • Tag Devices by Manufacturer

Protocols Covered:

  • Zigbee
  • DECT
  • LoRA
  • Proprietary peripheral protocols
  • and other IoT protocols

Who should attend?

  • Security Professionals (Physical, Cyber, SIGINT, TSCM)
  • J2/6, G2/6, A2/6, N2/6
  • Network Operations Professionals
  • Intelligence, Surveillance and Reconnaissance, and Cyber Effects Operations
  • Command, Control, Communications and Computer Systems (C4)
  • Joint Staff Intelligence
  • Information Dominance, Intelligence, Network Operations, Cyberspace Operations