How Supply Chain Attacks Work – And What You Can Do to Stop Them

The headline-making attack against Solarwinds sent a shockwave through the world and had many security and business leaders reexamining the security of their own supply chains. In a supply chain – or third party - attack, criminals infiltrate and disrupt the computer systems of a company’s key suppliers or vendors and, through this third-party access, are then able to breach other organizations associated with the initial target. In this webinar, experts talk through the stages of a supply chain attack. You will also learn what tools and strategies you can start using immediately to assess your own supply chain security and put defenses in place to keep your supply chain protected.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll learn about:

  • Assessing an organization’s current software supply chain risk.
  • How Software Bills of Materials (SBOMs) fit into the future of supply chain security.
  • A few crucial best practices for preventing software supply chain attacks.
  • Accounting for flaws lurking in open-source repositories.

Featured Speakers

  • Jake Williams
    Jake Williams
    Executive Director of Cyber Threat Intelligence
    SCYTHE

    Jake Williams is a cybersecurity expert has two decades of experience in secure network design, penetration testing, incident response, forensics and malware reverse engineering. He has worked with many government agencies in information security at federal, state, and local levels. Williams is an IANS Faculty Member and also works as a SANS Analyst. He is a prolific speaker on topics in information security and has trained thousands of people on incident response, red team operations, reverse engineering, cyber threat intelligence, and other information security topics. Jake is the two time winner of the DC3 Digital Forensics Challenge, a recipient of the DoD Exceptional Civilian Service Award, and is one of only a handful of people to ever be certified as Master Network Exploitation Operator by the US Government.

  • Cameron Hyde
    Cameron Hyde
    Product Marketing Manager, Prisma Cloud
    Palo Alto Networks

    Cameron is a product marketing manager for Prisma Cloud at Palo Alto Networks, helping customers secure their cloud native environments. Previously, he was a product marketing manager focused on storage DevOps at Dell Technologies.

  • Becky Bracken
    Becky Bracken
    Editor
    Dark Reading

    Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.

Sponsored By