InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threats Below The Surface in High-Risk Devices

Presented by

John Loucaides, VP Federal Technology, Eclypsium

About this talk

As cybersecurity improves, attackers are seeking new methods to subvert traditional security controls - going below the surface to penetrate vulnerable firmware and hardware components inside today’s servers, laptops and networking equipment. Most organizations lack visibility into this attack surface. They can’t easily see which hardware and firmware components are in their fleet or determine which devices are vulnerable to known threats — much less detect a hidden implant or backdoor. These blind spots allow attackers to subvert traditional security controls and persist undetected, leaving organizations exposed to device tampering, ransomware, and data breaches. In this presentation, you’ll learn - What’s at risk under the hood in your devices - How the threat landscape is changing - How TrickBot malware locates UEFI vulnerabilities - Why attackers are targeting firmware - The importance of addressing supply chain risk - How to protect devices at scale
Eclypsium Cybersecurity

Eclypsium Cybersecurity

3886 subscribers50 talks
IT and AI Infrastructure Security
Eclypsium is the industry’s leading IT and AI Infrastructure Supply Chain Security company. Eclypsium defends enterprises and government agencies from vulnerabilities and supply chain threats hidden within hardware and firmware that traditional EDR and VM solution's miss.
Related topics