What’s New with Eclypsium? Schedule a Demo at Booth E02


  • Stop Next Gen Ransomware: Eclypsium detects HybridPetya and other advanced ransomware that evades EDR by targeting UEFI, firmware, and boot-level systems. 
  • Hardening Network Devices Against Attacks: Network infrastructure is increasingly targeted as a backdoor into enterprise environments. Eclypsium provides visibility and control at the firmware level, enabling organizations to harden routers, switches, and firewalls against advanced and persistent threats.
  • Detect Hidden Risks in Firmware: Uncover and mitigate vulnerabilities, backdoors, and malicious code embedded in device firmware using deep analysis and continuous monitoring.
  • Secure The Entire Device Lifecycle: Cyber risks start in the supply chain, and can hit any time, from device onboarding to enterprise operations to IT asset decommission. Eclypsium prevents supply chain attacks, unknown vulnerabilities, and data risk at every stage.

Shadow Networks and Synthetic TrustSecuring Government Supply Chains in the Age of AI

Level 3, Room GW6 | Sands Convention & Expo Center
30 minutes

Date: Tuesday, 21 October 2025 – 15:00

Speaker: Wes Dobry – Vice President – Solution Engineering

As governments accelerate AI adoption, “trust” has become a geopolitical flashpoint. Once-abstract cyber risks—compromised firmware, counterfeit hardware, hijacked GPUs, and state-level implants—now pose real threats to digital sovereignty.

This session, tailored for senior government officials, national security leaders, and public sector CISOs, explores how geopolitical tension, shadow supply chains, and AI infrastructure exploitation are reshaping cyber trust in government systems.

Stop by Booth E06 and play Supply Chain Invaders

Think you can outlast the Supply Chain Invaders?  Stop by the booth and play the game!  All gamers will receive an Eclypsium hat and the high score for each day (Tuesday – Thursday) will win a Flipper Zero.