InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

What Auditors Need to Know When Evaluating Firmware Compliance

Presented by

John Loucaides, VP of Federal Technology

About this talk

Recent updates to NIST 800-53 and other compliance standards emphasize that controls must extend down to firmware and hardware. To keep pace with widespread attacks and new standards, organizations must incorporate firmware security into risk management and compliance processes and address blind spots that have given attackers a new foothold. But what does this mean, and what should you be looking for? In a follow-on to his popular ISACA presentation, Eclypsium’s John Loucaides will delve deeper into the questions auditors should ask, and the tools that are available to implement controls and verify due diligence within an organization. Eclypsium’s VP of Federal Technology, John Loucaides will discuss: - What is firmware, and why is it important? - Why firmware and hardware security is being called out in compliance frameworks - What questions to ask when conducting your audit - Evidence of compliance that can be produced - How Eclypsium is helping businesses collect this evidence
Eclypsium Cybersecurity

Eclypsium Cybersecurity

3847 subscribers49 talks
IT and AI Infrastructure Security
Eclypsium is the industry’s leading IT and AI Infrastructure Supply Chain Security company. Eclypsium defends enterprises and government agencies from vulnerabilities and supply chain threats hidden within hardware and firmware that traditional EDR and VM solution's miss.
Related topics