© 2025 Eclypsium, Inc.
Lightning Talks
Join us for one of our 15 minute Lightning Talks at RSAC 2025. Take a break from the show floor in Room 202 where we will have snacks and after each session we will be doing a drawing for a FlipperZero*.
*Must be present to win.
Shielding Network Devices: Proven Strategies to Defend Against Advanced Attacks
Network appliances such as VPNs, firewalls, load balancers, and routers must be connected to the open internet. They do not support EDR and have deep access to resources inside the perimeter. It’s no surprise that nation-state and criminal groups have increased their targeting of network devices, with devastating results. Learn techniques attackers use to compromise and evade detection on network devices and strategies to defend them.
Top Firmware Attack Vectors: Securing a Massive, Invisible Enterprise Attack Surface
Firmware presents real threats to the enterprise, and an attack surface enticing to threat actors. Cyberattackers use firmware vulnerabilities to break in and achieve persistence inside target environments, leading to repeated data breaches. In this lightning talk we’ll discuss how firmware vulnerabilities make their way through the IT infrastructure supply chain, and how to protect your enterprise from this growing category of threat.
AI Infrastructure Under Siege
AI datacenter infrastructure investment is skyrocketing. As LLMs and GPU-driven high performance computing (HPC) datacenters become an integral part of every business, they will also become an attractive target for cyberattackers. We’ll talk through some of the attacks and risks associated with AI infrastructure, LLMs, and GPUs down to the hardware and firmware level and how to stay ahead of them.
Keeping Up With The Typhoons: A Review of PRC Attack Tactics
2024 and 2025 saw huge disclosures of China-sponsored attackers given the “Typhoon” moniker targeting telecoms, critical infrastructure, and more. In this session we’ll talk through the heavy emphasis on network devices and infrastructure in the tactics and techniques used by Salt Typhoon, Volt Typhoon, Flax Typhoon, Silk Typhoon, and other PRC sponsored attack groups, and what they mean for enterprise cybersecurity.
What’s New with Eclypsium?
Visit Booth #226 and learn how to:
- Protect Next-Gen AI Datacenters
- Harden Network Devices Against Attack
- Detect Hidden Risks in Firmware
Supply Chain Invaders
Think you can outlast the Supply Chain Invaders? Stop by Booth #226 and play the game! All gamers will receive a new T-shirt and the high score for each day (Tuesday – Thursday) will win a FlipperZero.