Deconstructing Supply Chain Attacks for Better Risk Management

Logo
Presented by

David SooHoo & Allan Liska

About this talk

In this webinar, learn how supply chain attacks happen by going through a case study — from leaked credentials appearing on the dark web to stolen data ending up on a ransomware extortion website. Topics will include: - Understand how modern supply chain attacks are carried out - See how third-party intelligence can identify early indicators of risk - Learn the proactive measures you can take to mitigate supply chain risk
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (72)
Subscribers (4045)
Recorded Future delivers meaningful results for our clients. Whether it’s improving efficiency for research and triage, slashing time to threat detection, or improving your organization’s bottom line, we are dedicated to saving our clients time and money — in addition to measurably reducing risk. We believe that intelligence is the key to unlocking the potential of security programs – and protecting our organizations and communities. We believe that security solutions should do just that: be solutions – helping to solve big problems and reduce risk. We know that the right intelligence, in the hands of the right people, at the right time, stops attackers in their tracks.