Lying below the traditional operating system (Windows, Linux, Mac) is an entire "world down under" ripe for attacking. The firmware and hardware attack surface is diverse and wrought with vulnerabilities that are increasingly being exploited to great effect. Attackers have learned to fly under the radar, dip down underneath the traditional security stack, and persist indefinitely, all while enjoying the omnipotence and flexibility that firmware-level attacks provide.
In this webinar, Scott Scheferman, Principal Cyber Strategist at Eclypsium, will share insights from recent attacks that challenge how we think about device security. You’ll learn:
- Why APTs and criminal gangs are increasingly targeting firmware and hardware
- Examples of firmware level vulnerabilities being used in the wild
- How gaps in visibility - from supply chain to continuous operational risk management - undermine our defenses, and what we are doing about it
- Why proactive risk management needs to incorporate hardware and firmware security
-How defenders can meet the challenge down under
Hackers have moved down for a reason. Now, defenders must too.