Secure Your Networks Perimeter

Author: ISACA
Date Published: 4 September 2019

Gaining perimeter access to networks can easily be accomplished via physical or proximity means. Some easy ways to thwart nefarious actors are to turn off your phone Wi-Fi when you leave your work or home and to never pick up a misplaced universal serial bus (USB) drive on the sidewalk. Threat actors can manipulate your network through Internet of Things (IoT)/Industrial Control Systems (ICS) devices, physical-enabled remote access, radio frequency (RF) geolocation and profiling.

Attend ISACA’s “Radio Realities: Wi-Fi and Physical Access Techniques” webinar to gain insight into and learn to mitigate possible threats to networks via physical and proximity access. This webinar takes place on 18 September at 11AM CDT (UTC -5 hours). ISACA members can earn 1 continuing professional education (CPE) hour by attending this webinar and completing a related survey.

Dustin Brewer, CSX-P, CCSP, CEH, CHFI, manager and product platform developer of cybersecurity at ISACA, will present the webinar. Brewer has 17 years of experience in the IT field beginning with networks, programming and hardware specialization. He excelled in the cybersecurity field with computer incident response teams and as a senior test engineer while serving in the US military; specialized in computer networking security, penetration testing and training for various US Department of Defense (DoD) and commercial entities; and currently, in his role at ISACA, develops innovative training programs to best prepare cybersecurity specialists for the future in this dynamic field. He will use his experience to help you secure your personal network.

To learn more about this webinar or to register for it, visit the Radio Realities: Wi-Fi and Physical Access Techniques page of the ISACA website.