Our wireless expert will explore the different challenges security professionals faced in securing network airspaces and combating the most common wireless network security threats such as password theft and malware, followed by best practice advice on how best to identify and monitor rogue deives and access points through automation.
2. Helping customers improve security posture since 2001
Full stack security assessment
Over 2,000 customers in all regions of the world
Really good at breaking technology
Acquired Pwnie Express in 2019
3. Outpost24 Template
2019
Today’s key topics
3
• Benchmarks from RSA 2020 of Wireless Security
trends
• Combatting wireless threats from BYOD and
Shadow IT
• Why asset and device visibility is critical to
wireless security
• Implementing wireless detection into your
security workflow
• Subtle changes to help boost your detection of
unauthorized access
• Takeaways
4. Outpost24 Template
2019
Today’s topic
4
Why risk is the new normal
Adapting to the threat landscape
Bringing in the business context
Business aligned remediation
Takeaways
View from a:
• Business perspective
• With a little added tech
6. Traditional wired networks had a simple security model
• One Way in, One way out
• Everything inside is ‘trusted’
7. Traditional wired networks had a simple security model
• One Way in, One way out
• Everything inside is ‘trusted’
…but wireless networks, quite literally, turn your network inside-out…
12. 12
Key Focus Points:
• Confidence in what they have
• Confidence in what's around them
• Ability to recognize threats
• Ability to react to threats
WIRELESSSECURITY:
THE INTERNET OF EVILTHINGS 2020
31. Evil Twin Access Points
31
Weak Wireless signal
Strong Wireless signal
Safe Corporate WirelessUnsafe Access Point
SSID: Acme_WirelessSSID: Acme_Wireless
Rogue access point
broadcasts the same
SSID as the corporate
access point
33. 33Who is responsible for monitoring your airspace?
• The network team?
• The security team?
• No-one?
34. 3434
Understanding the airspace
Classify and Normalize
Take Discovered data and transform
into more meaningful data
Report
View historical data which has previously been
gathered about a specific device
Continuous monitoring
Always looking at the wireless airspace
to identify any threats as and when
they are seen
Correlate
Correlate with previously discovered
data to identify anomalies and risks
Alert
If alert required due to
configuration of alerts.
Discover
Start with Raw data
38. • Wireless network confidence is still a
little behind for security professionals
• Same threats, different attack surface
• You can only protect yourself from
what you know about
• Building into your existing workflow is
simple
Takeaways