Threats Below The Surface in High-Risk Devices

Presented by

John Loucaides, VP Federal Technology, Eclypsium

About this talk

As cybersecurity improves, attackers are seeking new methods to subvert traditional security controls - going below the surface to penetrate vulnerable firmware and hardware components inside today’s servers, laptops and networking equipment. Most organizations lack visibility into this attack surface. They can’t easily see which hardware and firmware components are in their fleet or determine which devices are vulnerable to known threats — much less detect a hidden implant or backdoor. These blind spots allow attackers to subvert traditional security controls and persist undetected, leaving organizations exposed to device tampering, ransomware, and data breaches. In this presentation, you’ll learn - What’s at risk under the hood in your devices - How the threat landscape is changing - How TrickBot malware locates UEFI vulnerabilities - Why attackers are targeting firmware - The importance of addressing supply chain risk - How to protect devices at scale
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (36)
Subscribers (3272)
Eclypsium is the industry’s leading enterprise firmware protection platform - providing a new layer of security to protect your IT infrastructure from firmware attacks. Eclypsium defends enterprises and government agencies from vulnerabilities and threats hidden within firmware that are invisible to most organizations today.