shining a light on shadow devices
Post on 11-Apr-2017
Embed Size (px)
Something is Lurking inYour Network
Mobile Devices can connect directly to thecellular data network for a path around your security controls.
Smart Phones & Tablets
Allowing BYOB (bring your own device) can be cheaper but balancing protection of corporate data against antagonizing employees has been challenging.
Printers & Scanners
Office Devices can become targets, providing attackers with beachheads on your networks.
Connected Security Devices
Attackers grant themselves access via a security device using the default password with physical security devices.
It could be a sensor collecting information from factory robots or a warehouse system, but many of these devices are networked too so they can be attacked.
Control Systems &Equipment
Ramifications of attacks on medical devices arefar more severe.
Thermostats,Security & Automation
Connected home items have a network connection and access to the Intertubes, so it can be attacked.
Moving automobiles, which can use a smart phone connection or its own internet, can be attacked and controlled remotely.
Start protecting yourself by focusing on visibility to discover the entirety of your attack surface, and then determine the best means of providing controls to protect your environment.