SlideShare a Scribd company logo
www.bastille.io
Security for the Mobile World and
the Internet of Things
www.bastille.io
The Big Secret about
The Internet of Things
It’s not about the “Things”,
it’s about the Radios!
It’s not about the “Things”, it’s about the RADIOS
3
Year: 2020
25B Devices
20B have Radios
Hundreds of Protocols
Billions of Devices
4
It’s not about the “Things”,
it’s about the RADIOS
Year: 2020
25B Devices
20B have Radios
5
It’s not about the “Things”, it’s about the RADIOS
Year: 2020
25B Devices 20B have Radios
The Internet of Things is Now!
6
Vulnerable
Wireless Devices
in
the Enterprise
Today
• 15 patents in process
–Small Device Radio
–Radio traffic analysis
–Radio Machine Learning
–RF persona
7
Bastille Intellectual Property
Case Study: Data Center Vulnerabilities
Unconfigured
Zigbee Network
Bluetooth Keyboard
Vulnerability
Examples of things that Bastille looks for:
Data exfiltration New members of Mesh Networks
Mobile phone “hotspots” Out of policy devices:hotspots, cams
BlueTooth Tethering to phones Unconfigure devices looking for pairs
Rogue Cell Towers Changes in behavior of a device in RF
Bugs Changes in behavior of RF Persona
RF Personas in the wrong areas
Known radio attack execution
New transmitters
9
Examples of things that Bastille looks for:
Data exfiltration New members of Mesh Networks
Mobile phone “hotspots” Out of policy devices:hotspots, cams
BlueTooth Tethering to phones Unconfigure devices looking for pairs
Rogue Cell Towers Changes in behavior of a device in RF
Bugs Changes in behavior of RF Persona
RF Personas in the wrong areas
Known radio attack execution
New transmitters
10
Examples of things that Bastille looks for:
Data exfiltration New members of Mesh Networks
Mobile phone “hotspots” Out of policy devices:hotspots, cams
BlueTooth Tethering to phones Unconfigure devices looking for pairs
Rogue Cell Towers Changes in behavior of a device in RF
Bugs Changes in behavior of RF Persona
RF Personas in the wrong areas
Known radio attack execution
New transmitters
11
Questions for your organization
In addition to WiFi, what other radio connected devices are operating in my facilities?
How many of these devices are set to default passwords?
Do I have any wireless mice in my facilty today?
Do I have MDM on every mobile device connected to my network?
What is my long term plan monitoring a Radio Enabled World.
12
Security for the Mobile World and
the Internet of Things

More Related Content

What's hot

NFC (Near Field Communication)
NFC (Near Field Communication)NFC (Near Field Communication)
NFC (Near Field Communication)
Pushpak Elleedu
 
Smart Watches
Smart WatchesSmart Watches
Smart Watches
eXplanoTech
 
Wi Fi
Wi FiWi Fi
Mobile Payment - Will NFC finally unlock a new value chain?
Mobile Payment - Will NFC finally unlock a new value chain?Mobile Payment - Will NFC finally unlock a new value chain?
Mobile Payment - Will NFC finally unlock a new value chain?
Martin Gutberlet
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
Krishnaprasad Arumugam
 
NFC Mobile Payments 2016 What’s Next?
NFC Mobile Payments 2016 What’s Next?NFC Mobile Payments 2016 What’s Next?
NFC Mobile Payments 2016 What’s Next?
NFC Forum
 
NFC Patents for Smartphone Mobile Payments 2Q 2015
NFC Patents for Smartphone Mobile Payments 2Q 2015NFC Patents for Smartphone Mobile Payments 2Q 2015
NFC Patents for Smartphone Mobile Payments 2Q 2015
Alex G. Lee, Ph.D. Esq. CLP
 
4 g
4 g4 g
4G (SUD)
4G (SUD)4G (SUD)
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
NFC Innovation in the Age of COVID-19
NFC Innovation in the Age of COVID-19NFC Innovation in the Age of COVID-19
NFC Innovation in the Age of COVID-19
NFC Forum
 
NFC & The Growth of Connected Consumer Electronics Devices
NFC & The Growth of Connected Consumer Electronics DevicesNFC & The Growth of Connected Consumer Electronics Devices
NFC & The Growth of Connected Consumer Electronics Devices
NFC Forum
 
NFC for the Real World
NFC for the Real WorldNFC for the Real World
NFC for the Real World
Robert Labancz
 
Blue bite mit nfc goes social feb2013
Blue bite mit nfc goes social feb2013Blue bite mit nfc goes social feb2013
Blue bite mit nfc goes social feb2013
MIT Enterprise Forum Cambridge
 
3G
3G3G
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
Belal Ashraf
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
Pavan Kumar B S
 
NFC Bridging the Internet of Things
NFC Bridging the Internet of ThingsNFC Bridging the Internet of Things
NFC Bridging the Internet of Things
NFC Forum
 
Latest wireless technology
Latest wireless technologyLatest wireless technology
Latest wireless technology
nurmeen1
 
Application of near field communication (nfc)
Application of near field communication (nfc)Application of near field communication (nfc)
Application of near field communication (nfc)
Vijay Thakkar
 

What's hot (20)

NFC (Near Field Communication)
NFC (Near Field Communication)NFC (Near Field Communication)
NFC (Near Field Communication)
 
Smart Watches
Smart WatchesSmart Watches
Smart Watches
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Mobile Payment - Will NFC finally unlock a new value chain?
Mobile Payment - Will NFC finally unlock a new value chain?Mobile Payment - Will NFC finally unlock a new value chain?
Mobile Payment - Will NFC finally unlock a new value chain?
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
 
NFC Mobile Payments 2016 What’s Next?
NFC Mobile Payments 2016 What’s Next?NFC Mobile Payments 2016 What’s Next?
NFC Mobile Payments 2016 What’s Next?
 
NFC Patents for Smartphone Mobile Payments 2Q 2015
NFC Patents for Smartphone Mobile Payments 2Q 2015NFC Patents for Smartphone Mobile Payments 2Q 2015
NFC Patents for Smartphone Mobile Payments 2Q 2015
 
4 g
4 g4 g
4 g
 
4G (SUD)
4G (SUD)4G (SUD)
4G (SUD)
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
NFC Innovation in the Age of COVID-19
NFC Innovation in the Age of COVID-19NFC Innovation in the Age of COVID-19
NFC Innovation in the Age of COVID-19
 
NFC & The Growth of Connected Consumer Electronics Devices
NFC & The Growth of Connected Consumer Electronics DevicesNFC & The Growth of Connected Consumer Electronics Devices
NFC & The Growth of Connected Consumer Electronics Devices
 
NFC for the Real World
NFC for the Real WorldNFC for the Real World
NFC for the Real World
 
Blue bite mit nfc goes social feb2013
Blue bite mit nfc goes social feb2013Blue bite mit nfc goes social feb2013
Blue bite mit nfc goes social feb2013
 
3G
3G3G
3G
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC Bridging the Internet of Things
NFC Bridging the Internet of ThingsNFC Bridging the Internet of Things
NFC Bridging the Internet of Things
 
Latest wireless technology
Latest wireless technologyLatest wireless technology
Latest wireless technology
 
Application of near field communication (nfc)
Application of near field communication (nfc)Application of near field communication (nfc)
Application of near field communication (nfc)
 

Viewers also liked

NMR sample slide deck. test #1
NMR sample slide deck. test #1NMR sample slide deck. test #1
NMR sample slide deck. test #1
Charles Luyt
 
2012 sample investor preso
2012 sample investor preso2012 sample investor preso
2012 sample investor preso
kipmcc
 
Launching an IT startup: A how-to from Skwibl
Launching an IT startup: A how-to from SkwiblLaunching an IT startup: A how-to from Skwibl
Launching an IT startup: A how-to from Skwibl
Tatiana Protasova
 
2010 sample investor / VC pitch deck
2010 sample investor / VC pitch deck2010 sample investor / VC pitch deck
2010 sample investor / VC pitch deck
kipmcc
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Adam Dunkels
 
IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16
Mark Goldstein
 
Alliance of Angel's Pitch Deck Template
Alliance of Angel's Pitch Deck TemplateAlliance of Angel's Pitch Deck Template
Alliance of Angel's Pitch Deck Template
Bryan Starbuck
 
Company Profile
Company Profile Company Profile
Company Profile
Sergey Chubuk
 
10 Slide Lean Startup MVP Deck Example
10 Slide Lean Startup MVP Deck Example10 Slide Lean Startup MVP Deck Example
10 Slide Lean Startup MVP Deck Example
Bogdan Cirlig
 
Slide deck example
Slide deck exampleSlide deck example
Slide deck example
scaleit
 
Accel partners India - sample startup pitch deck
Accel partners India -  sample startup pitch deckAccel partners India -  sample startup pitch deck
Accel partners India - sample startup pitch deck
Prayank Swaroop
 
Class 8 science chapter 7 lesson 3
Class 8 science chapter 7 lesson 3Class 8 science chapter 7 lesson 3
Class 8 science chapter 7 lesson 3
Abdulláh Mámun
 
Yoav Friedländer-AND
Yoav Friedländer-ANDYoav Friedländer-AND
Yoav Friedländer-ANDYoav Friedl
 
Hola
HolaHola
Class eight bangladesh & global studies content 05
Class eight bangladesh & global studies content 05Class eight bangladesh & global studies content 05
Class eight bangladesh & global studies content 05
Abdulláh Mámun
 
Anchal CV
Anchal CVAnchal CV
Anchal CV
Anchal Monga
 
Class eight bangladesh global studies chapter 13, lesson-2
Class eight bangladesh global studies chapter 13, lesson-2Class eight bangladesh global studies chapter 13, lesson-2
Class eight bangladesh global studies chapter 13, lesson-2
Abdulláh Mámun
 
Class 8 science chapter 9 rivision
Class 8 science chapter 9 rivisionClass 8 science chapter 9 rivision
Class 8 science chapter 9 rivision
Abdulláh Mámun
 
Tugas matematika - Kelompok 3
Tugas matematika - Kelompok 3Tugas matematika - Kelompok 3
Tugas matematika - Kelompok 3
mizhaphisari
 
How to Change SA Password in Microsoft SQL Server 2008
How to Change SA Password in Microsoft SQL Server 2008How to Change SA Password in Microsoft SQL Server 2008
How to Change SA Password in Microsoft SQL Server 2008
sunqueen
 

Viewers also liked (20)

NMR sample slide deck. test #1
NMR sample slide deck. test #1NMR sample slide deck. test #1
NMR sample slide deck. test #1
 
2012 sample investor preso
2012 sample investor preso2012 sample investor preso
2012 sample investor preso
 
Launching an IT startup: A how-to from Skwibl
Launching an IT startup: A how-to from SkwiblLaunching an IT startup: A how-to from Skwibl
Launching an IT startup: A how-to from Skwibl
 
2010 sample investor / VC pitch deck
2010 sample investor / VC pitch deck2010 sample investor / VC pitch deck
2010 sample investor / VC pitch deck
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
Building the Internet of Things with Thingsquare and Contiki - day 1, part 2
 
IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16
 
Alliance of Angel's Pitch Deck Template
Alliance of Angel's Pitch Deck TemplateAlliance of Angel's Pitch Deck Template
Alliance of Angel's Pitch Deck Template
 
Company Profile
Company Profile Company Profile
Company Profile
 
10 Slide Lean Startup MVP Deck Example
10 Slide Lean Startup MVP Deck Example10 Slide Lean Startup MVP Deck Example
10 Slide Lean Startup MVP Deck Example
 
Slide deck example
Slide deck exampleSlide deck example
Slide deck example
 
Accel partners India - sample startup pitch deck
Accel partners India -  sample startup pitch deckAccel partners India -  sample startup pitch deck
Accel partners India - sample startup pitch deck
 
Class 8 science chapter 7 lesson 3
Class 8 science chapter 7 lesson 3Class 8 science chapter 7 lesson 3
Class 8 science chapter 7 lesson 3
 
Yoav Friedländer-AND
Yoav Friedländer-ANDYoav Friedländer-AND
Yoav Friedländer-AND
 
Hola
HolaHola
Hola
 
Class eight bangladesh & global studies content 05
Class eight bangladesh & global studies content 05Class eight bangladesh & global studies content 05
Class eight bangladesh & global studies content 05
 
Anchal CV
Anchal CVAnchal CV
Anchal CV
 
Class eight bangladesh global studies chapter 13, lesson-2
Class eight bangladesh global studies chapter 13, lesson-2Class eight bangladesh global studies chapter 13, lesson-2
Class eight bangladesh global studies chapter 13, lesson-2
 
Class 8 science chapter 9 rivision
Class 8 science chapter 9 rivisionClass 8 science chapter 9 rivision
Class 8 science chapter 9 rivision
 
Tugas matematika - Kelompok 3
Tugas matematika - Kelompok 3Tugas matematika - Kelompok 3
Tugas matematika - Kelompok 3
 
How to Change SA Password in Microsoft SQL Server 2008
How to Change SA Password in Microsoft SQL Server 2008How to Change SA Password in Microsoft SQL Server 2008
How to Change SA Password in Microsoft SQL Server 2008
 

Similar to bastille IoT deck - powerpoint presentation design

Questions in iot
Questions in iotQuestions in iot
Questions in iot
vishal choudhary
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
Bev Robb
 
Introduction_To_IoT
Introduction_To_IoTIntroduction_To_IoT
Introduction_To_IoT
Barry Wang
 
5G presentation by Troy Garrison - security implications.pptx
5G presentation by Troy Garrison - security implications.pptx5G presentation by Troy Garrison - security implications.pptx
5G presentation by Troy Garrison - security implications.pptx
Augusta55
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
Zoltan Balazs
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective
Signals Defense, LLC
 
Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015
Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015
Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015
SiteVisibility
 
Brighton SEO Mobile Marketing in the Age of 5G
Brighton SEO  Mobile Marketing in the Age of 5GBrighton SEO  Mobile Marketing in the Age of 5G
Brighton SEO Mobile Marketing in the Age of 5G
Jon Hibbitt
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
Five Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverFive Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking Forever
Open Networking Summit
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
Md.Imtiaz Ahmed
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
Arpan Pal
 
The Evolution of the Cell Phone
The Evolution of the Cell PhoneThe Evolution of the Cell Phone
The Evolution of the Cell Phone
TANMOY GHOSH
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
hyacinthshackley2629
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
Shivangi Dubey
 
Some thoughts on IoT, HKNOG 4.0
Some thoughts on IoT, HKNOG 4.0Some thoughts on IoT, HKNOG 4.0
Some thoughts on IoT, HKNOG 4.0
APNIC
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...
lilianedwards
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
Frank Siepmann
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
Yury Chemerkin
 
What Data Are You Leaking? BSidesLV Presentation
What Data Are You Leaking? BSidesLV Presentation What Data Are You Leaking? BSidesLV Presentation
What Data Are You Leaking? BSidesLV Presentation
keyalea
 

Similar to bastille IoT deck - powerpoint presentation design (20)

Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
Introduction_To_IoT
Introduction_To_IoTIntroduction_To_IoT
Introduction_To_IoT
 
5G presentation by Troy Garrison - security implications.pptx
5G presentation by Troy Garrison - security implications.pptx5G presentation by Troy Garrison - security implications.pptx
5G presentation by Troy Garrison - security implications.pptx
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective Cyber Security: Stalking Prey: An RF Hackers Perspective
Cyber Security: Stalking Prey: An RF Hackers Perspective
 
Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015
Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015
Digital Marketing In The Age Of 5G Mobile - BrightonSEO September 2015
 
Brighton SEO Mobile Marketing in the Age of 5G
Brighton SEO  Mobile Marketing in the Age of 5GBrighton SEO  Mobile Marketing in the Age of 5G
Brighton SEO Mobile Marketing in the Age of 5G
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Five Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking ForeverFive Trends Enabled by 5G that will Change Networking Forever
Five Trends Enabled by 5G that will Change Networking Forever
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
The Evolution of the Cell Phone
The Evolution of the Cell PhoneThe Evolution of the Cell Phone
The Evolution of the Cell Phone
 
11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
 
Some thoughts on IoT, HKNOG 4.0
Some thoughts on IoT, HKNOG 4.0Some thoughts on IoT, HKNOG 4.0
Some thoughts on IoT, HKNOG 4.0
 
Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...Location, Location, Location? Legal and Privacy Issues around Processing of P...
Location, Location, Location? Legal and Privacy Issues around Processing of P...
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
What Data Are You Leaking? BSidesLV Presentation
What Data Are You Leaking? BSidesLV Presentation What Data Are You Leaking? BSidesLV Presentation
What Data Are You Leaking? BSidesLV Presentation
 

Recently uploaded

Virtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburghVirtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburgh
millarj46
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NishantRathi18
 
Divertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8djDivertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8dj
lunaemel03
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
GOWSIKRAJA PALANISAMY
 
PDF SubmissionDigital Marketing Institute in Noida
PDF SubmissionDigital Marketing Institute in NoidaPDF SubmissionDigital Marketing Institute in Noida
PDF SubmissionDigital Marketing Institute in Noida
PoojaSaini954651
 
Timeless Principles of Good Design
Timeless Principles of Good DesignTimeless Principles of Good Design
Timeless Principles of Good Design
Carolina de Bartolo
 
CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
PabloMartelLpez
 
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptxUNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
GOWSIKRAJA PALANISAMY
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
qo1as76n
 
Connect Conference 2022: Passive House - Economic and Environmental Solution...
Connect Conference 2022: Passive House -  Economic and Environmental Solution...Connect Conference 2022: Passive House -  Economic and Environmental Solution...
Connect Conference 2022: Passive House - Economic and Environmental Solution...
TE Studio
 
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
Febless Hernane
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
184804
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
Kyungeun Sung
 
Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1
Decomart Studio
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
talaatahm
 
Heuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdfHeuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdf
Jaime Brown
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
kecekev
 
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
qo1as76n
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
Techno Merch
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
pmgdscunsri
 

Recently uploaded (20)

Virtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburghVirtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburgh
 
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHINHR Engineers Portfolio 2023 2024 NISHANT RATHI
NHR Engineers Portfolio 2023 2024 NISHANT RATHI
 
Divertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8djDivertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8dj
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
 
PDF SubmissionDigital Marketing Institute in Noida
PDF SubmissionDigital Marketing Institute in NoidaPDF SubmissionDigital Marketing Institute in Noida
PDF SubmissionDigital Marketing Institute in Noida
 
Timeless Principles of Good Design
Timeless Principles of Good DesignTimeless Principles of Good Design
Timeless Principles of Good Design
 
CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
 
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptxUNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
 
Connect Conference 2022: Passive House - Economic and Environmental Solution...
Connect Conference 2022: Passive House -  Economic and Environmental Solution...Connect Conference 2022: Passive House -  Economic and Environmental Solution...
Connect Conference 2022: Passive House - Economic and Environmental Solution...
 
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
 
Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
 
Heuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdfHeuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdf
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
 
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
哪里办理美国中央华盛顿大学毕业证双学位证书原版一模一样
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
 

bastille IoT deck - powerpoint presentation design

  • 1. www.bastille.io Security for the Mobile World and the Internet of Things
  • 2. www.bastille.io The Big Secret about The Internet of Things It’s not about the “Things”, it’s about the Radios!
  • 3. It’s not about the “Things”, it’s about the RADIOS 3 Year: 2020 25B Devices 20B have Radios Hundreds of Protocols Billions of Devices
  • 4. 4 It’s not about the “Things”, it’s about the RADIOS Year: 2020 25B Devices 20B have Radios
  • 5. 5 It’s not about the “Things”, it’s about the RADIOS Year: 2020 25B Devices 20B have Radios
  • 6. The Internet of Things is Now! 6 Vulnerable Wireless Devices in the Enterprise Today
  • 7. • 15 patents in process –Small Device Radio –Radio traffic analysis –Radio Machine Learning –RF persona 7 Bastille Intellectual Property
  • 8. Case Study: Data Center Vulnerabilities Unconfigured Zigbee Network Bluetooth Keyboard Vulnerability
  • 9. Examples of things that Bastille looks for: Data exfiltration New members of Mesh Networks Mobile phone “hotspots” Out of policy devices:hotspots, cams BlueTooth Tethering to phones Unconfigure devices looking for pairs Rogue Cell Towers Changes in behavior of a device in RF Bugs Changes in behavior of RF Persona RF Personas in the wrong areas Known radio attack execution New transmitters 9
  • 10. Examples of things that Bastille looks for: Data exfiltration New members of Mesh Networks Mobile phone “hotspots” Out of policy devices:hotspots, cams BlueTooth Tethering to phones Unconfigure devices looking for pairs Rogue Cell Towers Changes in behavior of a device in RF Bugs Changes in behavior of RF Persona RF Personas in the wrong areas Known radio attack execution New transmitters 10
  • 11. Examples of things that Bastille looks for: Data exfiltration New members of Mesh Networks Mobile phone “hotspots” Out of policy devices:hotspots, cams BlueTooth Tethering to phones Unconfigure devices looking for pairs Rogue Cell Towers Changes in behavior of a device in RF Bugs Changes in behavior of RF Persona RF Personas in the wrong areas Known radio attack execution New transmitters 11
  • 12. Questions for your organization In addition to WiFi, what other radio connected devices are operating in my facilities? How many of these devices are set to default passwords? Do I have any wireless mice in my facilty today? Do I have MDM on every mobile device connected to my network? What is my long term plan monitoring a Radio Enabled World. 12
  • 13. Security for the Mobile World and the Internet of Things

Editor's Notes

  1. Here’s an example from a finanical services company we are helping. The VP of the Data Center told us “You won’t find anything we’ve got all of our wireless locked down.” However, we found that he had two devices….one Zigee, one bluetooth, which were promiscuously asking to pair with control devices. One made the Data Center Chillers vulnerable, one could allow sending commands to the mainframe.