Proof of concept demonstration of exfiltrating data across air-gapped systems using fan speeds and how this chain of compromise could be interrupted with the correct monitoring and alerting. Leveraging this example, the session will examine various other side-channel attacks that threaten networks wherever they live including supply chain interdiction, spinning hard drive attacks and more.
Pre-Requisites: Understanding of general defense-in-depth methodologies including continuous monitoring and air-gapped networks.
Security Strategy & Architecture Policy & Government Hackers & Threats Analytics Intelligence & Response
security architecture hackers & threats government spying cyber warfare & cyber weapons behavioral analytics
Share With Your Community