InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Live & Interactive: Stop a supply chain attack in action

Presented by

Alex Burmeister

About this talk

The modern enterprise is built on a mountain of third-party and open source software. While this software enables growth and agility, it also introduces untold risk to the enterprise. Compromises of the software supply chain are on the rise as a preferred attack style for intruders. This method takes advantage of trusted pathways to evade detection by traditional security tools. By compromising trusted vendors with large customer lists, intruders can achieve a one-to-many amplifying effect. Listen in for an informative conversation of a modern supply chain attack. Our experts will expose the post-compromise attack techniques that are being used by advanced supply chain attackers, as observed in real customer environments. Learn their playbook and stop supply chain attacks in their tracks. Using ExtraHop Reveal(x) 360, our experts will demonstrate the exact steps that cyber defenders can use to stop a supply chain attack before it can result in a costly breach.
ExtraHop

ExtraHop

13096 subscribers106 talks
Unlocking the power of the network to see the truth & stop the threat
ExtraHop is reinventing network detection and response (NDR) to help enterprises stay ahead of emerging threats with unparalleled network visibility, context, and control. As new attack vectors rapidly emerge, SOCs face an escalating challenge: Expand visibility to effectively detect and respond to threats, enhance productivity to manage the increased volume, and do it all while reducing operational complexity. By combining the power of NDR with network performance management (NPM), intrusion detection (IDS), and packet forensics in a single, integrated platform, enterprises benefit from complete visibility and contextual insights across their entire hybrid infrastructure - from data center campuses to cloud and SASE infrastructures and beyond. ExtraHop can decrypt and unlock packet-level data at wire speeds, analyzing and correlating it with its cloud-scale machine learning models to detect, investigate, and remediate cyber risks in real-time, without the added complexity of multiple tools. Unlock the full power of network detection and response with ExtraHop today. Learn more at www.extrahop.com
Related topics