Protecting Your Data from Third-Party Vulnerabilities
Tom Parker is CTO of security consultancy FusionX. Tom is recognized throughout the security industry for his research in multiple areas, including adversary profiling and software vulnerability research and analysis. He has published books on the topic of information security, including Cyber Adversary Characterization: Auditing the Hacker Mind, and is a contributor to the popular Stealing the Network Series. Tom is a frequent speaker at conferences, including Black Hat, and often lends his time to guest lecturing at universities and participating in community research initiatives. He is frequently called to provide his expert opinion to mass media organizations, including BBC News, CNN, Reuters News, Wired, and Business Week.
Editor in Chief
Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.
Recent major security breaches, including a compromise at the Target retail chain, have demonstrated the potential for cyber attackers to reach their targets through business partners and contractors. In this webcast, experts discuss methods for auditing supplier connections to expose potential vulnerabilities before they are exploited.
- Discuss the various ways that an enterprise might be compromised through partner connections.
- Highlight recent attacks and exploits that occur through third-party systems and applications.
- Offer recommendations on how to check/audit third-party systems and applications to expose potential vulnerabilities.
- Provide tips on how to partner with third parties to ensure better security across the supply chain.
- Outline methods for working with partners on incident response in the event that a breach does occur.
Cyber attackers are increasingly seeing opportunities for exploiting weaknesses in the “soft spots” of the supply chain. This webcast will help you find ways to defend your enterprise.