Compromising the Perimeter

The presentation address the common methods and tactics used to physical penetration facilities and inserting persistent access devices into the network. Discussion on why those methods work as well as the ways to correct the flaws discussed during the presentation. The incorrect perceptions of physical security vs the reality of physical security from an executive level. Some tool demonstrations will be performed to detail common methods for bypassing physical security controls (not lock picking).

Presented by