Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Axelum s.r.o.
Forums it-sa Expo Knowledge Forum B

The forgotten attack vector

Phishing and web attacks are getting harder, so attackers are turning to the forgotten vector. How secure are your physical sites?

calendar_today Wed, 11.10.2023, 12:00 - 12:15

event_available Hybrid

place Forum, Booth 6-235

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud Data security / DLP / Know-how protection Governance, Riskmanagement and Compliance Identity and access management Network Security / Patch Management Secure Homeoffice Data Center

Key Facts

  • Physical access means access to your critical systems.
  • It is about much more than picking locks.
  • We have never failed to access a network via physical method

Organizer

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Phishing and web attacks are getting harder, so attackers are turning to the forgotten vector. As such attackers and Red Teams simulating them are turning to physical access to deploy listening devices, cameras, key loggers, and network implants. Alternatively, they could just be looking to gain direct access to your systems, crown jewels or intellectual property.

All of the human vulnerabilities that existed for phishing are still there along with even more possibilities in the physical world.

Often your physical sites expose additional vulnerabilities in access card systems, locking mechanisms, CCTV and other systems that an attacker will exploit either through social engineering or Covert Methods of Entry. Many of which have been around for longer than your IT systems.

With more remote working and critical value being placed with C-level staff it may also be worth checking out their property.

Let's take a look at how an attacker views a server room door and the possible ways they could reach what's on the other side.

 

 

The International Forum is also available as a livestream. Follow this link to access the broadcast.

... read more

Language: English

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.