While vulnerabilities in software often steal headlines, hardware vulnerabilities pose a major cyber security risk. Hardware is comprised of numerous components, which are often sourced globally, and are difficult to track along the supply chain. A single vulnerability in any of the components could cause the device to be compromised by cyber criminals.
Protecting the integrity of devices and ensuring firmware is hardened to attack can be challenging when using traditional security controls and processes. Join our panel of experts on May 13, 2020 at 1 pm ET to learn:
- How to improve visibility into your device supply chain
- Why firmware vulnerabilities need to be prioritized
- Common weak spots for the introduction of tampering and modifications
Our panelists will be:
Dr. Edward Amoroso - CEO of research and advisory firm TAG Cyber and former CISO for AT&T
Richard M. (Dickie) George - Senior Advisor for Cyber Security at the Johns Hopkins University Applied Physics Lab, with a focus on cyber strategy for protection of critical national systems.
Andrew Regenscheid - Project Lead for Applied Cryptography within the Computer Security Division at the National Institute of Standards and Technology (NIST).
Dr. Yuriy Bulygin - CEO and founder of Eclypsium. Previously he led the Advanced Threat Research team at Intel, and created CHIPSEC, the open-source firmware security framework.