Finding phones, wearables and gadgets through Cellular, Bluetooth, Bluetooth Low Energy and Wi-Fi device detection
No doubt about it, there are devices violating your policy inside your facility as we speak.
At least, there are if you are not checking for them.
This could include the inadvertent violation of policy by an employee who accidentally left a smart phone in a bag or wore a paired smart phone to work by mistake. Or it could be an intentional attempt to eavesdrop on conversations and record them using a device in the facility, or to leverage paired devices to move data from inside a facility to a device outside.
Regardless, of the scenario, if you are not monitoring for signals inside your facility you are asking for trouble.
This webinar will feature an executive level overview of the emerging counterintelligence threat to intelligence community missions via mobile device protocols, including insights into the tactics and techniques of adversaries and the mitigation measures defenders should put in place.
Features speakers include Bob Gourley, an award winning former CTO of the Defense Intelligence Agency and co-founder of the cyber risk consultancy OODA LLC, and Bob Baxley, CTO of Bastille Networks.