Workshop 4: LIVE Security Pentest: Exploring the Limitations of 802.1x and Beyond

  • Date 04 Jun 2019

    Register Now

Workshop 4: LIVE Security Pentest: Exploring the Limitations of 802.1x and Beyond

04 Jun 2019, 14:00 - 16:00

Security Workshop

Dive into the reality of today’s heterogeneous networks in large enterprises – In this workshop, we will highlight the challenges these networks are facing and how easy social engineers and rogue devices can infiltrate a network unnoticed. 

As part of a live experiment, see agentless devices be easily identified the instant they come onto the network, take a look into hardware and software you didn’t know about and learn how to build a foundation for compliance reporting, patching, policy re-enforcement and incident response – without pulling resource from other critical tasks!

Join us for this interactive workshop that will take you beyond the use of 802.1x authentication and show you an easy way to achieve device visibility and control.

Learning Outcomes:

  1. Discover how easy social engineers can infiltrate a network
  2. Find out how you can protect non-802.1x from threats 
  3. See how easily agentless devices can be identified on the network 
  4. Learn how you can make compliance reporting easier
  5. Gain control of your network


Please note: Registering your interest does not guarantee you a seat. You will receive final joining instructions one week prior to the event and it will work on a first come, first served basis on the day.



  • Andrew Noonan


    Systems Engineer Manager

    Forescout Technologies

    Andrew has been in Forescout for over 5 years and in his current role of Systems Engineering Manager at Forescout, Andrew advises and enables clients...

  • Florian Guilbert


    Security Expert


    Synacktiv is a french security company specialized in offensive security, consulting on a wide range of topics such as pentesting, red teaming,...

Business Issues covered

  1. What will this session help you to do?
    • Mitigate the effects of new vulnerabilities and exploits‎
    • Understand internal and external threats and keep a business secure‎




We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.