Join us to hear how several new regulations and guidelines specifically point out firmware, and the firmware supply chain, as being in scope. Supply chains involving hardware, firmware, and software can be difficult to navigate.
In this presentation, we’ll explore how to combat issues related to an all-encompassing supply such as tampering, backdoors, and vulnerabilities, and how Eclypsium can help:
| Identify Identify and fingerprint your firmware by discovering and profiling every device that contains it, whether endpoint, server, or network device. |
| Verify Verify firmware profiles against the world’s largest database of vendors and configurations and assure alignment to security standards and policies. |
| Fortify Proactively and automatically update your firmware and ensure proper, secure configurations for any exploitable options and settings. |
We’ll also dive into how NIST is identifying firmware as critical software, CISA KEVs, and more. This will include practical advice, such as what to do when an attacker has gained access to your device and changed something - how do you know and how do you respond?
Please feel free to
reach out to me if you have any questions!