How to Protect Against Supply Chain Attacks
1 CERTIFIED PROFESSIONAL DEVELOPMENT HOUR (PDH) AVAILABLE UPON SUCCESSFUL COMPLETION OF AN EXAM.
Threat actors are always innovating and looking for new ways to exploit systems. One of the worrying recent trends has been the rise of supply chain attacks, where hackers target the weaker links in a supply chain network, such as third-party vendors who may not have robust cybersecurity practices in place. They’re especially insidious in the software industry because most companies don’t know — or don’t even know they need to know — which components go into making their commercial software packages.
The SolarWinds attack, which impacted everyone from Fortune 500 companies to government agencies, may have been the most high-profile example, but they’re far from the only victim. So are supply chain attacks going to be the next frontier in cyber warfare? This webcast looks at why supply chain attacks are on the rise and what your organization can do to protect against them.
Learning objectives:
- Examine why supply chain attacks are appealing to threat actors
- Explain why ransomware and supply chain are a toxic mix
- Offer strategies to protect your business from supply chain attacks
- Explain how software bill of materials (SBOMs) can help with risk management
Presented By:
John Deskurakis, Chief Product Security Officer, Carrier
Tony Turner, Vice President of Fortress Labs, Fortress Information Security
Moderated By:
Gary Cohen, Content Manager, CFE Media and Technology