Training

Events

Supply Chain Attacks: Are Enterprises Able to Detect and Respond?

Supply Chain Attacks: Are Enterprises Able to Detect and Respond?

We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. However, it can also be an attack on one of your service providers which can lead to an easy compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response .

See Also: Expel: Firms Still Threatened by Old Vulnerabilities

The session will discuss:

  • How to respond to software-associated supply chain attacks?
  • Intersection of DevOps and security
  • Security by design approach to secure software applications and evaluating the third-party products

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.