Safeguarding Device Integrity in the Supply Chain and Beyond

Presented by

Andrew Regenscheid (NIST), John Loucaides (Eclypsium)

About this talk

While most organizations are accustomed to dealing with external threats such as malware, the technology supply chain itself has rapidly emerged as an important source of risk. Proliferating vulnerabilities at the firmware and hardware level have opened the door for nation-state and ransomware attackers to gain control over laptops, servers, and network devices. Vulnerabilities or compromises in the supply chain can affect devices long before they are delivered and unboxed by the eventual owner, as well as during the update process. In this live webinar, our expert panel will discuss: - How the complex technology supply chain creates concentrations of risk - Recent supply chain threats and their implications for enterprise risk management - What a supply chain disaster scenario might look like - What organizations can do today to begin verifying device integrity in the supply chain and throughout the lifecycle of their devices - What’s coming down the road as part of the NIST project for “Validating the Integrity of Computing Devices.” Panelists: John Loucaides - Vice President of Research and Development at Eclypsium Andrew Regenscheid - Project Lead for Applied Cryptography within the Computer Security Division at the National Institute of Standards and Technology (NIST).
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (36)
Subscribers (3271)
Eclypsium is the industry’s leading enterprise firmware protection platform - providing a new layer of security to protect your IT infrastructure from firmware attacks. Eclypsium defends enterprises and government agencies from vulnerabilities and threats hidden within firmware that are invisible to most organizations today.