Supply Chain Protection: Stop Remote Code Execution During Runtime

Logo
Presented by

Virsec

About this talk

The SolarWinds supply chain attack was a brutal security failure that relied on perimeter tools, threat hunting and prior knowledge to stop an attack – only to find that these tools were powerless to identify and stop it. Existing security tools are not sufficient to secure the supply chain, namely because the most sophisticated attacks are occurring at runtime, a notorious blind spot in organizations. Conventional security tools are not instrumented to detect exploits in memory and do not provide any visibility into runtime. More importantly, they do not provide runtime protection, so evasive attacks that proliferate at the memory level often go undetected for days, months, or even years. Virsec joins the esteemed SANS Institute to share effective new tactics and tools to protect and defend against sophisticated and evasive supply chain attacks like remote code execution and other crippling runtime exploits. Watch a live demonstration of the technology that stops runtime exploits in its tracks, learn how to identify and prevent these attacks in your own infrastructure, and get best practices to protect your workloads against future or ongoing supply chain attacks.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (95)
Subscribers (4249)
Virsec is the industry leader of application-aware server workload protection. Learn how to improve and optimize your security posture, ensure real-time protection from today's most dangerous cyber threats and attacks, including memory corruption, fileless and zero-day attacks. Hear valuable insights from cybersecurity leaders, experts and influencers, vulnerability analysis and more.