What firmware exists in your computer and how the fight for your systems will be below your operating system

Page Content

MITRE

Steve Battista - MITRE

Apr 18, 2012

Size: 523.1MB

Download: Video Icon MP4 Video   Flash Icon Watch in your Browser (Flash Required)  

Abstract

Many security professionals look to software on hardrives as the source of compromise. To detect compromises, they use systems to check the hashes of all files on disk, When a machine is compromised, they wipe the hardrive, and assume that the machine in clean. The battlefield between attackers and defenders is moving to the firmware level. This presentation will explore what firmware exists in your computer and how the fight for your systems will be below your operating system and what can be done about this.

About the Speaker

Mr. Battista has over 20 years of professional experience in securing systems, creating architectures, examining research, and running programs. During this time has focused on large federal government and infrastructure systems. He currently works for MITRE as a lead cyber security engineer. He holds a M.B.A from Temple University and a M.S. in Computer Science from Villanova. He holds PMP, CISSP and NSA-IAM/IEM certifications. He is currently on the board of the ISSA-NOVA.


Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52, West Lafayette Campus. More information...

© 1999-2013 Purdue University. All rights reserved.

Use/Reuse Guidelines

CERIAS Seminar materials are intended for educational, non-commercial use only and any or all commercial use is prohibited. Any use must attribute "The CERIAS Seminar at Purdue University." Opinions expressed in the recordings are not necessarily representative of the views of CERIAS or of Purdue University.