What’s Really Down Under - Threats to Devices Below The Operating System

Presented by

Scott Scheferman - Principal Cyber Strategist, Eclypsium

About this talk

Lying below the traditional operating system (Windows, Linux, Mac) is an entire "world down under" ripe for attacking. The firmware and hardware attack surface is diverse and wrought with vulnerabilities that are increasingly being exploited to great effect. Attackers have learned to fly under the radar, dip down underneath the traditional security stack, and persist indefinitely, all while enjoying the omnipotence and flexibility that firmware-level attacks provide. In this webinar, Scott Scheferman, Principal Cyber Strategist at Eclypsium, will share insights from recent attacks that challenge how we think about device security. You’ll learn: - Why APTs and criminal gangs are increasingly targeting firmware and hardware - Examples of firmware level vulnerabilities being used in the wild - How gaps in visibility - from supply chain to continuous operational risk management - undermine our defenses, and what we are doing about it - Why proactive risk management needs to incorporate hardware and firmware security -How defenders can meet the challenge down under Hackers have moved down for a reason. Now, defenders must too.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (50)
Subscribers (3245)
Eclypsium is the industry’s leading enterprise firmware protection platform - providing a new layer of security to protect your IT infrastructure from firmware attacks. Eclypsium defends enterprises and government agencies from vulnerabilities and threats hidden within firmware that are invisible to most organizations today.