Webinar

Bob Baxley, CTO, Bastille

Bob Baxley, CTO, Bastille

Bastille for Red and Blue Teams

Learn how to use the MITRE ATT&CK framework to identify and locate new Advanced Persistent Threats for Data Exfiltration

Red or Blue Team?  We work with both Red and Blue teams to increase their knowledge of Advanced Persistent Threats and Vulnerabilities from Cellular, Bluetooth, Wi-Fi and IoT devices.

Time and again we hear “If you want to hunt threats, you have to have data”, while networks provide lots of data about devices connected to them, there is far less data available about devices in your facilities that form part of the “Shadow IT” environment. 

Bastille provides full visibility into RF-enabled devices operating in or close to your environment. Bastille detects the persistent threats that other network-only solutions cannot detect sending data, of up 150 fields per device, to your SIEM and existing enterprise infrastructure to give you all the information you need to identify and locate threats. 

Bastille FlyAway Kit - base model

Bastille FlyAway Kit - base model

During the webinar Bob discusses use cases and techniques, plus demonstrates the Bastille FlyAway Kit, a portable kit for detecting and locating near-network devices and data exfiltration threats. Bob covers how Bastille integrates with enterprise infrastructure and fits within the MITRE ATT&CK framework.

Bastille & MITRE ATT&CK Framework - sections in orange indicate where Bastille can assist

Bastille & MITRE ATT&CK Framework - sections in orange indicate where Bastille can assist

Demos: See Demos of the Bastille system detecting Cell phones, IoT, Wi-Fi and Bluetooth devices such as wearables.

Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here), where he led projects on SIGINT, Electronic Warfare and Covert Communications for DOD and IC customers.