• Overview

Join us for an Expert Webinar.

Recent supply chain attacks have proven that third parties are an unexpected, yet trusted entry vector into an organization. By utilizing legitimate methods to breach an organization, threat actors can hide under the radar with escalated privileges.

This session will:
  • Outline techniques to monitor and control this attack vector, along with ways to engage with suppliers
  • Discuss the value of network telemetry
  • Examine supply chain attack specifics to find opportunities for security posture improvement

Abdallah Alomari | Intelligence Analyst | FS-ISAC

Mike Campfield | VP, GM of International Operations and
Global Security Programs | ExtraHop

Register Now