
The forgotten attack vector
Phishing and web attacks are getting harder, so attackers are turning to the forgotten vector. How secure are your physical sites?
Topic
When & Where
Details
Format:
Management lecture
Session description
Phishing and web attacks are getting harder, so attackers are turning to the forgotten vector. As such attackers and Red Teams simulating them are turning to physical access to deploy listening devices, cameras, key loggers, and network implants. Alternatively, they could just be looking to gain direct access to your systems, crown jewels or intellectual property.
All of the human vulnerabilities that existed for phishing are still there along with even more possibilities in the physical world.
Often your physical sites expose additional vulnerabilities in access card systems, locking mechanisms, CCTV and other systems that an attacker will exploit either through social enginee ...
Moderator
