Shining a Light on Shadow Devices

10
SHADOW DEVICES: Something is Lurking in Your Network

Transcript of Shining a Light on Shadow Devices

SHADOW DEVICES:

Something is Lurking inYour Network

Mobile Devices can connect directly to thecellular data network for a path around your security controls.

SHADOW DEVICES:

Smart Phones & Tablets

Allowing BYOB (bring your own device) can be cheaper but balancing protection of corporate data against antagonizing employees has been challenging.

SHADOW DEVICES:

Employee Devices

SHADOW DEVICES:

Printers & Scanners

Office Devices can become targets, providing attackers with beachheads on your networks.

SHADOW DEVICES:

Connected Security Devices

Attackers grant themselves access via a security device using the default password with physical security devices.

It could be a sensor collecting information from factory robots or a warehouse system, but many of these devices are networked too — so they can be attacked.

SHADOW DEVICES:

Control Systems &Equipment

SHADOW DEVICES:

HealthcareDevices

Ramifications of attacks on medical devices arefar more severe.

SHADOW DEVICES:

Thermostats,Security & Automation

Connected home items have a network connection and access to the Intertubes, so it can be attacked.

SHADOW DEVICES:

Remote ControlledAutomobiles

Moving automobiles, which can use a smart phone connection or its own internet, can be attacked and controlled remotely.

Protect YourEnvironment

Start protecting yourself by focusing on visibility to discover the entirety of your attack surface, and then determine the best means of providing controls to protect your environment.

SHADOW DEVICES: