Posted on
in Presentations
Proof of concept demonstration of exfiltrating data across air-gapped systems using fan speeds and how this chain of compromise could be interrupted with the correct monitoring and alerting. Leveraging this example, the session will examine various other side-channel attacks that threaten networks wherever they live including supply chain interdiction, spinning hard drive attacks and more.
Pre-Requisites: Understanding of general defense-in-depth methodologies including continuous monitoring and air-gapped networks.
Pre-Requisites: Understanding of general defense-in-depth methodologies including continuous monitoring and air-gapped networks.
Security Strategy & Architecture Policy & Government Hackers & Threats Analytics Intelligence & Response
security architecture hackers & threats cyber espionage cyber warfare & cyber weapons behavioral analytics
Topic
Security Strategy & Architecture
Policy & Government
Hackers & Threats
Analytics Intelligence & Response
Subtopic
security architecture
hackers & threats
cyber espionage
cyber warfare & cyber weapons
behavioral analytics
Share With Your Community