August 14, 2025
Time: 1:00 pm ET | 10:00 am PT
Speakers: Wes Dobry, VP of Solution Engineering and Paul Asadoorian, Principal Security Researcher
The addition of CVE-2024-54085 to CISA's Known Exploited Vulnerabilities catalog signals a historic shift—BMC vulnerabilities have evolved from theoretical research topics to active weapons in sophisticated cyber campaigns. These embedded management systems, present in every enterprise server and AI data center, now represent a dangerous and underestimated attack vector.
Key Topics:
- The CISA KEV Wake-Up Call: Why the inclusion of a first-ever BMC vulnerability in the KEV marks a critical turning point in enterprise security, and what it means for your organization's risk posture
- The Perfect Storm of Privilege and Invisibility: How BMCs operate outside traditional security boundaries with root-level access, making them ideal for persistent, undetectable attacks that survive OS reinstalls and security tool deployments
- Executive Action Plan: Practical steps security leaders can take immediately to assess BMC exposure, implement protective controls, and build organizational resilience against this emerging threat class
- Call to Action: Don't let your organization's BMCs become the adversary’s secret weapon. Register now to learn how to transform this critical blind spot into a controlled security asset.