WEBINAR

Capture IoT ghosts lurking in your network! 

Tuesday, Oct. 30th – 12:00-12:30PM EST (9:00-9:30AM PST) 

See whats lurking in your wireless infrastructure and uncover Shadow IoT Networks and Devices that can provide scary pathways to your sensitive data. Learn about these new IoT data exfiltration threats in the cyber security world from our Threat Research team.
Learn about:
  • New IoT protocols, frequencies, and machine-to-machine communications
  • How is a Shadow IoT network different from an IoT Rogue?
  • What new Shadow IoT risks should I look for?
  • How do I protect my organization from these risks?
All attendees (1 per company or organization) will receive a special one year introductory price 5 sensor subscription towards providing visibility into the invisible. Offer good until Dec. 31, 2018.

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

The presenter: 
Michael T. Raggo, Chief Security Officer, 802 Secure (CISSP, NSA-IAM, CSI) has over 20 years of security research experience. His current focus are wireless IoT threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books, and contributing author for “Information Security the Complete Reference 2nd Edition”. His Data Hiding book is also included at the NSA’s National Cryptologic Museum at Ft. Meade.

A former security trainer, Michael has briefed international defense agencies including the FBI, Pentagon, and Queensland Police; is a frequent presenter at security conferences including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon, and SANS; and has been featured on CNN Tech, TIME, Bloomberg, Forbes, and numerous other television and media outlets. He was also awarded the Pentagon’s Certificate of Appreciation.