Supply Chain Attacks: Are Enterprises Able to Detect and Respond?
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. However, it can also be an attack on one of your service providers which can lead to an easy compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response .
See Also: Expel: Firms Still Threatened by Old Vulnerabilities
The session will discuss:
- How to respond to software-associated supply chain attacks?
- Intersection of DevOps and security
- Security by design approach to secure software applications and evaluating the third-party products