Every mission depends on physical hardware – from servers to switches to laptops and computer mice. With so much cybersecurity time and attention on software, many federal executives are overlooking critical vulnerabilities that are being exploited in their hardware. Several agencies have already become a victim of hardware attacks because they view their hardware as inherently trusted. The good news is that addressing these critical vulnerabilities is easy, but only if you understand the risks. In this webcast, discover:
- What attacks are being wage against hardware devices.
- Where should hardware threats fall among your risk management prioritization; and
- What steps you can take to implement rogue device mitigation.
Wednesday, June 17, 2020
2:00 PM – 6:00 PM UTC