Navigating PrintNightmare aka CVE-2021-1675

On Demand Webinar

Register to download your copy:

Proof-of-concept exploit code was published on Github on June 29, 2021 for a vulnerability (CVE-2021-1675) in Print Spooler (spoolsv.exe), a Windows program that manages print jobs.

In this webinar, Nato Riley, Integrations Engineer at Blumira will discuss the implications and remediation recommendations for this vulnerability. He’ll cover:

  • Detections you can monitor to prevent the vulnerability from making an impact on your organization
  • Similar dependency-based attacks, and what we can learn from them
  • Which tools you can use to protect your organization

This interactive, conversational-style session encourages questions and engagement with viewers — so sign up today for access to our security experts.


Nato Riley, Integrations Engineer, Blumira

Nato is dedicated to helping Blumira build the most effective and efficient SIEM on the market for small to mid-sized businesses. Prior to joining Blumira, he held roles at LogRhythm and Data Network Group. Other ventures include notiaPoint, Inc., where Nato invented the Olympiad, a toolbox that makes large scale projects and deployments for cloud development projects more secure and agile. In his spare time, Nato runs a YouTube channel, Nato as Code, where he discusses topics such as infrastructure as code and building a cybersecurity career.

Patrick Garrity, VP of Operations
Patrick has years of experience in the security industry, building and scaling usable security products. He currently leads Blumira’s product, sales and marketing teams. Prior to joining Blumira, he led sales engineering, product marketing and international expansion for Duo Security.