Supply Chain Attacks: Are Enterprises Able to Detect and Respond?

Supply Chain Attacks: Are Enterprises Able to Detect and Respond?

We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider that cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks ushers in the risk: supplier vulnerabilities which the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.

See Also: BEC Defense: Advanced Tactics to Shield Your Organization

The session will discuss:

  • How to respond to software-associated supply chain attacks?;
  • Intersection of DevOps and security;
  • Security by design approach to secure software applications and evaluating the third-party products.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.