Tactics of Physical Intrusion: 2 p.m. CST Jan. 26 Register Now
Critical infrastructure is susceptible to a wide range of risks: from cyber attacks to service outages, but perhaps the most unnerving is the notion of a physical break-in. Attackers who can lay hands on technology and equipment are capable of stealing data, compromising operations, absconding with valuable supplies, or simply wreaking havoc.
As head of a Physical Penetration team, my crew has a very rewarding job. We are tasked with simulating attackers and breaking into facilities of all types, across the country. Then with faces agog, executives routinely watch me describe (or show video) of their doors and cabinets popping open in seconds.
This presentation will highlight some of the most exciting and shocking methods by which my team and I routinely gain entry in on physical jobs.
About the Presenter:
While paying the bills as a security auditor and penetration testing consultant with The CORE Group, Deviant Ollam is also a member of the Board of Directors of the US division of TOOOL, The Open Organisation Of Lockpickers. His books Practical Lock Picking and Keys to the Kingdom are among Syngress Publishing’s best-selling pen testing titles. In addition to being a lockpicker, Deviant is also a GSA certified safe and vault technician and inspector. At multiple annual security conferences Deviant runs the Lockpick Village workshop area, and he has conducted physical security training sessions for Black Hat, DeepSec, ToorCon, HackCon, ShakaCon, HackInTheBox, ekoparty, AusCERT, GovCERT, CONFidence, the FBI, the NSA, DARPA, the National Defense University, the United States Naval Academy at Annapolis, and the United States Military Academy at West Point. His favorite Amendments to the US Constitution are, in no particular order, the 1st, 2nd, 9th, & 10th.