Supply chain attacks are the new high-water mark of attacks
Attackers will always choose the easiest path most likely to succeed. And which is a target more likely to open – the unknown email with an attachment, or an invoice from a known and trusted supplier? We analyse some of the most prominent recent supply chain attacks and share how to combat them.
Recorded on: Friday 17th September 2021
The supply chain: Our modern Achilles' heel?
Recent ransomware attacks have once again highlighted both our dependence on supply chains and our vulnerability to attacks through them. Do we fully understand the risks, or have we become overwhelmed by their complexity? Join us as we explore how to manage supply chain risks and the steps you can take to mitigate them.
Recorded on: Wednesday 21st July 2021
REvil Kaseya ransomware attack: What you need to know
Last weekend, the REvil ransomare gang exploited a vulnerability in Kaseya VSA, effectively distributing ransomware downstream to hundreds of organisations. Join us to learn how the group was able to execute this supply chain attack and how to find out if you are at risk. We’ll also give you practical mitigation and recovery steps.
Recorded on: Friday 16th July 2021
Email fraud: The imposter among us
Where a scam targets its supply chain, an organisation suffers substantial losses, both in time and money - in particular, the costs of resolving the problem and repairing the damage. Join us to hear real-world examples of BEC and supply chain email fraud, the tactics in play, and how you can identify and block imposter attacks.
Recorded on: Tuesday 25th May 2021
Weaknesses in software supply chains: Cyber’s unspoken reality
Over the last few years, supply chains have become an increasingly lucrative target for hackers. And when the core software supply chain itself is compromised, the results are often catastrophic. Join us as we examine the weaknesses in software supply chains and discover what you can do to protect your organisation from malicious attacks.
Recorded on: Friday 14th May 2021
SASIG Academy Supply Chain Session 2 - Supply chain questionnaires
Our fourth SASIG Academy series focuses on supply chains. Our second session of the series looks at novel new approaches to questionnaires and new initiatives in action. If you missed Session 1, catch up in our webinar library.
Our fourth SASIG Academy series focuses on supply chains. This session maps out the series, covers the basics you should have in place when engaging third-party supply chains, and introduces some of the more sophisticated approaches you could adopt.
Recorded on: Friday 9th April 2021
Blind administration: An interactive supply chain compromise crisis simulation
How would you respond to a cyberattack compromising state secrets? Based on the 2020 SUNBURST attack, Immersive Labs’ crisis simulation lets you experience managing the political, diplomatic, reputational and security impact of a supply chain compromise exposing your data. Join us to find out how well you could cope in a crisis threatening national security.