bastille IoT deck - powerpoint presentation design

Post on 15-Apr-2017

34 views 3 download

Transcript of bastille IoT deck - powerpoint presentation design

www.bastille.io

Security for the Mobile World and the Internet of Things

www.bastille.io

The Big Secret about The Internet of Things

It’s not about the “Things”, it’s about the Radios!

It’s not about the “Things”, it’s about the RADIOS

3

Year: 202025B Devices20B have Radios

Hundreds of Protocols

Billions of Devices

4

It’s not about the “Things”, it’s about

the RADIOSYear: 202025B Devices

20B have Radios

5

It’s not about the “Things”, it’s about the RADIOS

Year: 202025B Devices 20B have Radios

The Internet of Things is Now!

6

Vulnerable Wireless

Devices in the Enterprise

Today

• 15 patents in process–Small Device Radio–Radio traffic analysis–Radio Machine Learning–RF persona

7

Bastille Intellectual Property

Case Study: Data Center Vulnerabilities

Unconfigured Zigbee Network

Bluetooth Keyboard

Vulnerability

Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters

9

Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters

10

Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters

11

Questions for your organizationIn addition to WiFi, what other radio connected devices are operating in my facilities?How many of these devices are set to default passwords?Do I have any wireless mice in my facilty today?Do I have MDM on every mobile device connected to my network?What is my long term plan monitoring a Radio Enabled World.

12

? ? ?

Security for the Mobile World and the Internet of Things