Webcast: How to Protect Against Supply Chain Attacks

Courtesy: CFE Media and Technology

Attendees are eligible for one certified professional development hour (PDH).

Threat actors are always innovating and looking for new ways to exploit systems. One of the worrying recent trends has been the rise of supply chain attacks, where hackers target the weaker links in a supply chain network, such as third-party vendors who may not have robust cybersecurity practices in place. They’re especially insidious in the software industry because most companies don’t know — or don’t even know they need to know — which components go into making their commercial software packages.

The SolarWinds attack, which impacted everyone from Fortune 500 companies to government agencies, may have been the most high-profile example, but they’re far from the only victim. So are supply chain intrusions going to be the next frontier in cyber warfare? This May 6 webcast looks at why supply chain attacks are on the rise and what your organization can do to protect against them.

Learning Objectives:

  • Examine why supply chain attacks are appealing to threat actors
  • Explain why ransomware and supply chain are a toxic mix
  • Offer strategies to protect your business from supply chain attacks
  • Explain how software bill of materials (SBOMs) can help with risk management

Presented By:
John Deskurakis, Chief Product Security Officer, Carrier
Tony Turner, VP of Fortress Labs, Fortress Information Security

Moderated By:
Gary Cohen, Senior Content Manager, CFE Media and Technology

Sponsor: Epicor




Keep your finger on the pulse of top industry news