Do you turn the Wi-Fi off on your phone when you leave the house or work? If you see a USB drive on the sidewalk do you just keep walking? … Well you should!
In this workshop we will go through some of the techniques used to gain perimeter access to networks via physical or proximity means using inexpensive hardware and open source tools.
Discover how nefarious actors can manipulate different aspects of your network including:
- IoT/ICS Devices
- Physical enabled remote access
- RF Geo-location
Join this webinar and gain insight into possible threats to networks via physical and proximity access and learn a few mitigation techniques.
Dustin Brewer, CSXP, CCSP, CEH, CHFIManager, Product Platform Developer, Cybersecurity
Dustin Brewer has 17 years of experience in the IT field beginning with networks, programming, and hardware specialization.
He completed a bachelor's degree in Cybersecurity and Information Assurance at Western Governor's University, and while serving in the U.S. Military, he excelled in the Cybersecurity field with Computer Incident Response Teams and as a Senior Test Engineer while stationed at Fort Meade. Working as an independent contractor and lead developer for defense contract agencies, he specialized in computer networking security, penetration testing, and training for various DoD and commercial entities.
As the Manager for Cybersecurity Technical Content with ISACA, he currently develops innovative training programs to best prepare cybersecurity specialists for the future of this dynamic field.