Protecting Device Integrity in the Supply Chain

Presented by

Dr. Ed Amoroso - TAG Cyber, Dickie George - Johns Hopkins, Andrew Regenscheid - NIST, Yuriy Bulygin - Eclypsium

About this talk

While vulnerabilities in software often steal headlines, hardware vulnerabilities pose a major cyber security risk. Hardware is comprised of numerous components, which are often sourced globally, and are difficult to track along the supply chain. A single vulnerability in any of the components could cause the device to be compromised by cyber criminals. Protecting the integrity of devices and ensuring firmware is hardened to attack can be challenging when using traditional security controls and processes. Join our panel of experts on May 13, 2020 at 1 pm ET to learn: - How to improve visibility into your device supply chain - Why firmware vulnerabilities need to be prioritized - Common weak spots for the introduction of tampering and modifications Our panelists will be: Dr. Edward Amoroso - CEO of research and advisory firm TAG Cyber and former CISO for AT&T Richard M. (Dickie) George - Senior Advisor for Cyber Security at the Johns Hopkins University Applied Physics Lab, with a focus on cyber strategy for protection of critical national systems. Andrew Regenscheid - Project Lead for Applied Cryptography within the Computer Security Division at the National Institute of Standards and Technology (NIST). Dr. Yuriy Bulygin - CEO and founder of Eclypsium. Previously he led the Advanced Threat Research team at Intel, and created CHIPSEC, the open-source firmware security framework.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (50)
Subscribers (3176)
Eclypsium is the industry’s leading enterprise firmware protection platform - providing a new layer of security to protect your IT infrastructure from firmware attacks. Eclypsium defends enterprises and government agencies from vulnerabilities and threats hidden within firmware that are invisible to most organizations today.