shining a light on shadow devices

Download Shining a Light on Shadow Devices

Post on 11-Apr-2017

580 views

Category:

Technology

2 download

Embed Size (px)

TRANSCRIPT

  • SHADOW DEVICES:

    Something is Lurking inYour Network

  • Mobile Devices can connect directly to thecellular data network for a path around your security controls.

    SHADOW DEVICES:

    Smart Phones & Tablets

  • Allowing BYOB (bring your own device) can be cheaper but balancing protection of corporate data against antagonizing employees has been challenging.

    SHADOW DEVICES:

    Employee Devices

  • SHADOW DEVICES:

    Printers & Scanners

    Office Devices can become targets, providing attackers with beachheads on your networks.

  • SHADOW DEVICES:

    Connected Security Devices

    Attackers grant themselves access via a security device using the default password with physical security devices.

  • It could be a sensor collecting information from factory robots or a warehouse system, but many of these devices are networked too so they can be attacked.

    SHADOW DEVICES:

    Control Systems &Equipment

  • SHADOW DEVICES:

    HealthcareDevices

    Ramifications of attacks on medical devices arefar more severe.

  • SHADOW DEVICES:

    Thermostats,Security & Automation

    Connected home items have a network connection and access to the Intertubes, so it can be attacked.

  • SHADOW DEVICES:

    Remote ControlledAutomobiles

    Moving automobiles, which can use a smart phone connection or its own internet, can be attacked and controlled remotely.

  • Protect YourEnvironment

    Start protecting yourself by focusing on visibility to discover the entirety of your attack surface, and then determine the best means of providing controls to protect your environment.

    SHADOW DEVICES: