August 10 | 11:00am - 12:00pm
ABSTRACT:
The emerging threat of advanced hardware attacks has become a much greater risk for most organizations due to security architecture decisions that place great reliance upon the ability of hardware devices to securely hold and manage cryptographic material that form a critical element in the security model. Hardware attacks continue to evolve and become more strategically appealing to well-funded threat actors. Learn about the spectrum of low-level hardware attack vectors including fault injection, side channel analysis, and chip imaging and edits. In addition, get a high-level view of the threatscape today and in the near future, IOActive’s strategy for advanced hardware security services, and how this is a particularly interesting area of interest for threat actors launching supply chain attacks.
John Sheehy, SVP, Research & Strategy
John has overseen multiple projects delivering identity management, threat modeling, industrial control systems security, risk assessment, security policy, secure device design, and incident & breach simulation and response services. His experience includes over 20 years of system architecture, systems integration, and information security experience working in Enterprise Architecture, Identity & Access Management, Vulnerability & Threat Management, Operations Technology, Security Strategy, Systems Architecture, and Hardware/Application Security domains. He currently leads IOActive’s research program, corporate strategy, and service offering development.
Register Today |