Friday 17 September 2021, 11am-12noon (BST)
Supply chain-based attacks continue to be on the rise. Today, it’s often done by first compromising one of the end target’s trusted suppliers, then abusing their relationship to gain access.
Attackers will always choose the easiest path most likely to succeed. And which is a target more likely to open – the unknown email with an attachment, or an invoice from a known and trusted supplier?
In this webinar, we analyse some of the most prominent supply chain attacks, including Kayesa, SolarWinds, and NotPetya, and share our recommendations for C-Level decision-makers on how to combat supply chain attacks.
Guest chaired by
Deborah Haworth (info) CISO, Penguin Random House UK
Lloyd Webb (info), VP Sales Engineering EMEA & APJ, SentinelOne