13
www.bastille.io Security for the Mobile World and the Internet of Things

bastille IoT deck - powerpoint presentation design

Embed Size (px)

Citation preview

Page 1: bastille IoT deck - powerpoint presentation design

www.bastille.io

Security for the Mobile World and the Internet of Things

Page 2: bastille IoT deck - powerpoint presentation design

www.bastille.io

The Big Secret about The Internet of Things

It’s not about the “Things”, it’s about the Radios!

Page 3: bastille IoT deck - powerpoint presentation design

It’s not about the “Things”, it’s about the RADIOS

3

Year: 202025B Devices20B have Radios

Hundreds of Protocols

Billions of Devices

Page 4: bastille IoT deck - powerpoint presentation design

4

It’s not about the “Things”, it’s about

the RADIOSYear: 202025B Devices

20B have Radios

Page 5: bastille IoT deck - powerpoint presentation design

5

It’s not about the “Things”, it’s about the RADIOS

Year: 202025B Devices 20B have Radios

Page 6: bastille IoT deck - powerpoint presentation design

The Internet of Things is Now!

6

Vulnerable Wireless

Devices in the Enterprise

Today

Page 7: bastille IoT deck - powerpoint presentation design

• 15 patents in process–Small Device Radio–Radio traffic analysis–Radio Machine Learning–RF persona

7

Bastille Intellectual Property

Page 8: bastille IoT deck - powerpoint presentation design

Case Study: Data Center Vulnerabilities

Unconfigured Zigbee Network

Bluetooth Keyboard

Vulnerability

Page 9: bastille IoT deck - powerpoint presentation design

Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters

9

Page 10: bastille IoT deck - powerpoint presentation design

Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters

10

Page 11: bastille IoT deck - powerpoint presentation design

Examples of things that Bastille looks for:Data exfiltration New members of Mesh NetworksMobile phone “hotspots” Out of policy devices:hotspots, camsBlueTooth Tethering to phones Unconfigure devices looking for pairsRogue Cell Towers Changes in behavior of a device in RFBugs Changes in behavior of RF PersonaRF Personas in the wrong areasKnown radio attack executionNew transmitters

11

Page 12: bastille IoT deck - powerpoint presentation design

Questions for your organizationIn addition to WiFi, what other radio connected devices are operating in my facilities?How many of these devices are set to default passwords?Do I have any wireless mice in my facilty today?Do I have MDM on every mobile device connected to my network?What is my long term plan monitoring a Radio Enabled World.

12

? ? ?

Page 13: bastille IoT deck - powerpoint presentation design

Security for the Mobile World and the Internet of Things