How Supply Chain Attacks Work – And What You Can Do to Stop Them
The headline-making attack against Solarwinds sent a shockwave through the world and had many security and business leaders reexamining the security of their own supply chains. In a supply chain – or third party - attack, criminals infiltrate and disrupt the computer systems of a company’s key suppliers or vendors and, through this third-party access, are then able to breach other organizations associated with the initial target. In this webinar, experts talk through the stages of a supply chain attack. You will also learn what tools and strategies you can start using immediately to assess your own supply chain security and put defenses in place to keep your supply chain protected.