The Zero Trust Playbook: Securing Devic...
A Zero Trust program demands that every device, user, and network flow is authenticated and authorized. But are they? You can’t establish Zero Trust without establishing the integrity of your devices down to their underlying firmware and hardware. And every device consists of dozens of components relying on integrated firmware supplied by a multitude of vendors. Do you trust them? Join Paul Asadoorian, security evangelist at Eclypsium, a...
Securing the Federal Supply Chain with...
Join us to hear how several new regulations and guidelines specifically point out firmware, and the firmware supply chain, as being in scope. Supply chains involving hardware, firmware, and software can be difficult to navigate. In this presentation, we'll explore how to combat issues related to an all-encompassing supply such as tampering, backdoors, and vulnerabilities.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.