Bastille Networks Zero Trust Cybersecurity Practices

Event Details
March 18, 2021 - 2:00pm - 3:00pm

Learn how to include Cellular, Bluetooth, BLE and IoT devices into your Zero Trust policy

Use Cases and Techniques for Enhancing your Zero Trust practices with examples featuring Bastille and automated Network Access Control (NAC ) systems

  • Featured Speaker: Dr. Bob Baxley
  • Date: Thursday, March 18, 11am PT / 2pm ET - Register Today

Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access.

Dr. Bob BaxleyBastille provides full visibility into devices as they enter and exit your facilities. While devices may authenticate, many may not, and yet they are still inside your buildings, forming a shadow IT infrastructure capable of data capture and exfiltration. These devices should be under the same policy as your authorized devices that use Zero Trust policies.

Use Case: Integration with your Network Access Control (NAC) system to ensure Zero Trust policies are maintained Bastille will show you the authorized and unauthorized devices operating in or close to your environment. When integrated with a NAC such as Cisco ISE, Forescout or Aruba ClearPass this enables a complete Zero Trust policy to be maintained over all devices, whether they are already known to be using facility Wi-Fi, or radio systems beyond existing Zero Trust policies, such as Bluetooth, Cellular and IoT devices.

Zero Trust: The Challenges of Shadow IT and Vendor Equipment

Vendors installing equipment such as HVAC in your facilities have hard-wired network connections. While these are viewable to network management systems, what is not known is that many of these devices also contain active, open RF-interfaces to the control units which tend to have very simple or nonexistent security.  This is a case of Zero Trust gone wild -- your policy and systems are telling you that the device is safe to trust, yet it actually is not safe to trust at all. 

Bastille and Zero Trust

Bastille offers constant monitoring and visibility into the Zero Trust risks of mobile and portable radio-enabled devices including but not limited to:

  • Cellular
  • Wi-Fi
  • Bluetooth and BLE
  • Internet of Things (IoT) protocols (Zigbee, ISA100, WirelessHART, and more)
  • Plus many proprietary channels

Speaker: Dr. Bob Baxley, Bastille CTO and head of the Bastille Threat Research Team
Bob is the former Director of the Software Defined Radio Lab at Georgia Tech, where he led projects on SIGINT, Electronic Warfare and Covert Communications for DOD and IC customers.

Who should attend:

  • Zero Trust Security Professionals
  • Network and Cyber Security Professionals
  • Network Operations and SOC Professionals
  • Anyone concerned with data exfiltration risk

To learn more, sign up for the webinar, and submit a question to be answered during the event.