Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
DC reports that the number of Bluetooth devices shipped worldwide will exceed 1 billion in 2006. Declared "dead" on more than one occasion, Bluetooth technology is rapidly gaining adoption worldwide as a networking topology and a generic cable replacement technology. Despite the popularity of Bluetooth, many organizations don't realize their exposure to this popular wireless technology, thinking that Bluetooth is limited to short-range communications or doesn't expose sensitive data or access to network resources.
In this presentation, wireless security researcher Joshua Wright will disclose the risks and vulnerabilities of Bluetooth, dispelling common misconceptions. Focusing on actual attack tools and implementations, Joshua will demonstrate Bluetooth attacks in a live environment, and will demonstrate a new proof-of-concept tool designed to illustrate weaknesses in the selection of Bluetooth encryption keys.
Joshua is the author of several papers on wireless security and intrusion analysis, and the co-author of Securing Cisco Routers: Step-by-Step, a book published by the SANS Institute. In a consulting role, he has worked with Fortune 500 companies, federal agencies, and educational institutions addressing issues related to wireless security, vulnerability assessment, and secure network design. He currently serves as the senior security researcher for Aruba Networks and is a senior instructor for the SANS Institute.