Bastille Networks Zero Trust Cybersecurity Practices
Learn how to include Cellular, Bluetooth, BLE and IoT devices into your Zero Trust policy
Use Cases and Techniques for Enhancing your Zero Trust practices with examples featuring Bastille and automated Network Access Control (NAC ) systems
- Featured Speaker: Dr. Bob Baxley
- Date: Thursday, March 18, 11am PT / 2pm ET - Register Today
Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access.
Bastille provides full visibility into devices as they enter and exit your facilities. While devices may authenticate, many may not, and yet they are still inside your buildings, forming a shadow IT infrastructure capable of data capture and exfiltration. These devices should be under the same policy as your authorized devices that use Zero Trust policies.
Use Case: Integration with your Network Access Control (NAC) system to ensure Zero Trust policies are maintained Bastille will show you the authorized and unauthorized devices operating in or close to your environment. When integrated with a NAC such as Cisco ISE, Forescout or Aruba ClearPass this enables a complete Zero Trust policy to be maintained over all devices, whether they are already known to be using facility Wi-Fi, or radio systems beyond existing Zero Trust policies, such as Bluetooth, Cellular and IoT devices.
Zero Trust: The Challenges of Shadow IT and Vendor Equipment
Vendors installing equipment such as HVAC in your facilities have hard-wired network connections. While these are viewable to network management systems, what is not known is that many of these devices also contain active, open RF-interfaces to the control units which tend to have very simple or nonexistent security. This is a case of Zero Trust gone wild -- your policy and systems are telling you that the device is safe to trust, yet it actually is not safe to trust at all.
Bastille and Zero Trust
Bastille offers constant monitoring and visibility into the Zero Trust risks of mobile and portable radio-enabled devices including but not limited to:
- Cellular
- Wi-Fi
- Bluetooth and BLE
- Internet of Things (IoT) protocols (Zigbee, ISA100, WirelessHART, and more)
- Plus many proprietary channels
Speaker: Dr. Bob Baxley, Bastille CTO and head of the Bastille Threat Research Team
Bob is the former Director of the Software Defined Radio Lab at Georgia Tech, where he led projects on SIGINT, Electronic Warfare and Covert Communications for DOD and IC customers.
Who should attend:
- Zero Trust Security Professionals
- Network and Cyber Security Professionals
- Network Operations and SOC Professionals
- Anyone concerned with data exfiltration risk
To learn more, sign up for the webinar, and submit a question to be answered during the event.
- Tags:
- Aruba ClearPass
- authorized devices
- Bastille Networks
- Bastille Threat Research Team
- BLE devices
- Bluetooth devices
- Bob Baxley
- cellular devices
- Cisco ISE
- cybersecurity
- data capture
- data exfiltration
- facility Wi-Fi
- Forescout
- Internet of Things (IoT) protocols
- IoT devices
- Network Access Control (NAC )
- open RF-interfaces to the control units
- portable radio-enabled devices
- radio frequency (RF)
- radio systems beyond existing Zero Trust policies
- shadow IT infrastructure
- simple or nonexistent security
- unauthorized devices
- Vendor Equipment
- Zero Trust gone wild
- Zero Trust policy
- Zero Trust practices
- Login to post comments