OSI Layer 1: A New Data source for Hardware Visibility and Risk Management.
Enterprises rely on hardware devices for network operations. The growing number of IoT devices, supply chain challenges, IT/OT convergence, and the ability to work from anywhere, significantly increases the number of devices connected to a network. Discovering devices based on their physical existence using OSI Layer 1 as a data source is a new approach to gaining full visibility and for understanding the risks of connected hardware devices.
Focus of the panel is asset detection and how much you know about the devices
- Why is it important to know what’s on you network from a device perspective?
- Why is it important to understand the risks of new devices being connected to your network?
- What processes and procedures do you use to discover devices on your network and endpoints?
- We know organizations are challenged with seeing every device, why does this visibility gap still exist?
- What benefits do you see in using a new data source – Layer 1, which allows you to look for the existence of a device, not based on the activity or behavior of a device.
Kurt Wassersug of Sepio brings over 20 years of leadership experience and has worked in a myriad of cyber and InfoSec companies during his tenure. He has worked with some of largest global companies and has a deep understanding of operational and technical challenges security practitioners face. Kurt is a senior manager at Sepio, a company focused on providing complete visibility using the Physical Layer of the OSI Model. Layer 1 focuses on the existence of a device and can stop attacks instantly where traditional visibility tools use layer 2 (MAC) and layer 3+ (TCP/IP) network data to discover and identify devices. This is problematic as at Layers 2 and above, devices without a digital existence (passive taps, unmanaged switches, MiTM attacks or “spoofed” devices) go undetected.
Our Raleigh ISSA Chapter meeting will be on June 1, 2022. It will be located at the Frontier Center in RTP. The meeting will begin at 5:30pm with dinner/wine/beer. The panel will begin at 7pm. We will test your audio at 6:45pm.
Join us for the Raleigh ISSA Chapter event on June 1.
Sepio’s Hardware Access Control HAC-1, provides 100% hardware device visibility.
HAC-1 enables Hardware Access Control by setting rules based on the devices characteristics.
HAC-1 instantly detects any devices which breach the set rules and automatically block them to prevent malicious attacks.
The idea is to Verify and then Trust that those assets are what they say they are.
Sepio’s HAC-1 brings the ultimate solution to zero trust adoption by providing 100% hardware device visibility for Governments Agencies
With greater visibility, the zero-trust architecture can grant access decisions with complete information.
Thus, enhancing the enterprise’s protection within, and outside of, its traditional perimeters.
The Hardware Access Control capabilities of HAC-1, block Rogue Devices as soon as they are detected
HAC-1 stop an attack at the first instance, not even allowing such devices to make network access requests.
HAC-1 is here to protect Government Agencies and the nation’s critical infrastructure
Embracing Zero Trust Hardware Access is key.