Posted on
in Presentations
Proof of concept demonstration of exfiltrating data across air-gapped systems using fan speeds and how this chain of compromise could be interrupted with the correct monitoring and alerting. Leveraging this example, the session will examine various other side-channel attacks that threaten networks wherever they live including supply chain interdiction, spinning hard drive attacks and more.
Pre-Requisites: Understanding of general defense-in-depth methodologies including continuous monitoring and air-gapped networks.
Pre-Requisites: Understanding of general defense-in-depth methodologies including continuous monitoring and air-gapped networks.
Share With Your Community