Safeguarding Device Integrity in the Supply Chain and Beyond

Presented by

Andrew Regenscheid (NIST), John Loucaides (Eclypsium)

About this talk

While most organizations are accustomed to dealing with external threats such as malware, the technology supply chain itself has rapidly emerged as an important source of risk. Proliferating vulnerabilities at the firmware and hardware level have opened the door for nation-state and ransomware attackers to gain control over laptops, servers, and network devices. Vulnerabilities or compromises in the supply chain can affect devices long before they are delivered and unboxed by the eventual owner, as well as during the update process. In this live webinar, our expert panel will discuss: - How the complex technology supply chain creates concentrations of risk - Recent supply chain threats and their implications for enterprise risk management - What a supply chain disaster scenario might look like - What organizations can do today to begin verifying device integrity in the supply chain and throughout the lifecycle of their devices - What’s coming down the road as part of the NIST project for “Validating the Integrity of Computing Devices.” Panelists: John Loucaides - Vice President of Research and Development at Eclypsium Andrew Regenscheid - Project Lead for Applied Cryptography within the Computer Security Division at the National Institute of Standards and Technology (NIST).
Eclypsium Cybersecurity

Eclypsium Cybersecurity

3288 subscribers42 talks
IT and AI Infrastructure Security
Eclypsium is the industry’s leading IT and AI Infrastructure Supply Chain Security company. Eclypsium defends enterprises and government agencies from vulnerabilities and supply chain threats hidden within hardware and firmware that traditional EDR and VM solution's miss.
Related topics