Recent supply chain attacks have proven that third parties are an unexpected, yet trusted entry vector into an organization. By utilizing legitimate methods to breach an organization, threat actors can hide under the radar with escalated privileges.
This session will:
Outline techniques to monitor and control this attack vector, along with ways to engage with suppliers
Discuss the value of network telemetry
Examine supply chain attack specifics to find opportunities for security posture improvement