Posted on
in Presentations
Proof of concept demonstration of exfiltrating data across air-gapped systems using fan speeds and how this chain of compromise could be interrupted with the correct monitoring and alerting. Leveraging this example, the session will examine various other side-channel attacks that threaten networks wherever they live including supply chain interdiction, spinning hard drive attacks and more.
Pre-Requisites: Understanding of general defense-in-depth methodologies including continuous monitoring and air-gapped networks.
Pre-Requisites: Understanding of general defense-in-depth methodologies including continuous monitoring and air-gapped networks.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community