WEBINAR: Rogue Devices attacks on ATM through internal abusers and supply chain

May 27, 2020
9:00 AM - 10:00 AM (America/Chicago) - Add Time Zone
Erika Navarrete
+44 1322 339273
[email protected]

Register to Attend:

When an attacker evaluates his next target, he would usually conduct a reconnaissance phase (assuming it’s not just a high-volume attack campaign). Once completed, the attacker will have a full “inventory list” of the security measures taken – vendors, versions etc., he can then decide to go “head-to-head” with those security products or follow Sun Tzu’s advice, realizing that Cyber security products are getting better (and stronger) in the protection they offer.

Following Sun Tzu’s guidelines pushes the attacker to find alternative options – and HW/FW vulnerabilities seems to be the weakest link. As shown on multiple cases, exploiting HID device vulnerabilities can bypass multiple security measures, and impersonate as a legitimate device, without having to confront all those security measures.

Having difficulties accessing the internals of the ATM – why not go for the network interface, usually external, and less protected. Another option is to use supply chain, by infecting equipment, that is later introduced as spare parts that find their way into your infrastructure.

The fight is unfair, but there is still a lot that we can do.

Join us Wednesday, May 27th

Speaker: Bentsi Benatar, CMO and Co-Founder, Sepio Systems

There is no cost to attend this webinar and is open to all.

Global Sponsor - TMD Security
Global Sponsor - FIS
Global Sponsor - Auriga
Global Sponsor - KAL
Global Sponsor - NCR
Global Sponsor - Euronet Worldwide
Global Sponsor - Diebold Nixdorf
Global Sponsor - Payment Alliance International, Inc.
Global Sponsor - Prosegur
Global Sponsor - DPL
Global Sponsor - Mastercard
Global Sponsor - Cardtronics
Become a Global Sponsor
Join the Campaign

Global Sponsors