Contact us:
ISSA AUSTIN, CAPITOL OF TEXAS CHAPTER |

Hardware: Advanced Threats & Defenses

Hardware:

Advanced Threats & Defenses

Tuesday, October 16, 2018

Register Here

Jennie Kam (Cisco) discusses advanced hardware threats during purchase, boot, and runtime. These threats are applicable to just about anything with a processor – personal computers, servers, networking gear, and even those convenient digital assistants on your home counter.  Jennie discusses and presents hardware defense mechanisms to counter these threats.

Jennie Kam
Sr. Security Researcher
Cisco

Jennie Kam is a security researcher in Cisco’s Security and Trust Organization. Jennie’s embedded systems background enables her to evaluate the security posture of Cisco products from both a hardware and software perspective. Jennie is passionate about educating the next generation of cybersecurity professionals at all levels from elementary school to university students.

Skip to content