You will earn 1 CPE credits for attending this virtual bonus session
Presentation Format: Virtual - US Eastern
As we look at the 2021 threat landscape, there has been a fundamental and rapid shift that has gone unnoticed by many: 'Attackers are targeting the very foundation of computing itself; the device hardware and its firmware. 2020 was a year of firmware vulnerabilities and related attacks by APT's and criminal hackers alike, culminating in the startling discovery of TrickBoot (TrickBot's UEFI-targeting module). As we defenders move up the stack, and as EDR and other technologies have gotten better and faster at disrupting attacks at the OS layer and above, we have forced the hand of attackers and they have adapted by moving further down the stack, where they abuse trust and enjoy both omnipotence and indefinite persistence. Both criminals and APTs alike have converged upon firmware, as the ultimate escape from today's defenses. As it has been above ring zero, so it is now, below.
We'll take a look at:
SANS is committed to delivering high-quality cyber security training so you can keep your skills sharp and stay ahead of cyber threats. Join us for interactive training during SANS 2021 - Live Online (March 22-27, EDT), and receive relevant, applicable training from wherever you are. Choose your course and register now for practical training taught by top industry practitioners.
Learn more and register for course here