Hackers are using firmware implants and backdoors to compromise enterprise security with attacks that are stealthy and persistent. Eclypsium will demonstrate the techniques of successful firmware attacks as they apply to stages of a kill chain, exploring attacker motivations and attack vectors, as well as defensive strategies to protect your data and assets.