Rogue Devices and Hardware: The Soft Underbelly of Cybersecurity?

rouge device mitigation

Every mission depends on physical hardware – from servers to switches to laptops and computer mice. With so much cybersecurity time and attention on software, many federal executives are overlooking critical vulnerabilities that are being exploited in their hardware. Several agencies have already become a victim of hardware attacks because they view their hardware as inherently trusted. The good news is that addressing these critical vulnerabilities is easy, but only if you understand the risks. In this webcast, discover:

  • What attacks are being wage against hardware devices.
  • Where should hardware threats fall among your risk management prioritization; and
  • What steps you can take to implement rogue device mitigation.


Wednesday, June 17, 2020
2:00 PM – 6:00 PM UTC

Register now
  • Previous Post

    Supply Chain Risks Analysis

  • Next Post

    Hardware Access Control and Rogue Device Mitigation within the Food and Beverage IT/OT Environment