Visibility into the Invisible – Wireless Surveillance in your Enterprise Network
As your organization becomes increasingly wirelessly connected due to the IoT revolution, a new threat landscape is forming. This threat landscape is comprised of new wireless protocols, frequencies, and operating systems. In this webinar we’ll outline how to perform wireless surveillance to uncover risk and threats, and outline methods for mitigation.
- Review the broad wireless threat landscape
- Rogue cell towers
- Spy cameras
- Drones and automobiles
- WiFi Pineapples & Evil Twins
- Understand types of disruptions
- Outline a mitigation strategy
Michael T. Raggo, Chief Security Officer, 802 Secure (CISSP, NSA-IAM, CSI) has over 20 years of security research experience. His current focus are wireless IoT threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” for Syngress Books, and contributing author for “Information Security the Complete Reference 2nd Edition”. His Data Hiding book is also included at the NSA’s National Cryptologic Museum at Ft. Meade.
A former security trainer, Michael has briefed international defense agencies including the FBI, Pentagon, and Queensland Police; is a frequent presenter at security conferences including Black Hat, DEF CON, Gartner, RSA, DoD Cyber Crime, OWASP, HackCon, and SANS; and has been featured on CNN Tech, TIME, Bloomberg, Forbes, and numerous other television and media outlets. He was also awarded the Pentagon’s Certificate of Appreciation.