The Kaseya Breach: What Can You Do About a Supply Chain Attack?

Logo
Presented by

Demi Ben-Ari, Co-Founder and CTO, Panorays | James Azar, CISO - CISSP, Host of CISO Talk Podcast and CyberHub Podcast

About this talk

Not much time has passed since the last supply chain cyber attacks: SolarWinds, Accellion, Codecov, and now Kaseya. Do you think this will be the last one? We don’t. While you’re probably wondering what can be done to predict or prevent an incident like this in the future, we think the better question is: What can you do to prepare for the next one? In this webinar, we’ll discuss what actionable steps you can take to respond to the next supply chain attack to mitigate compromising your data and your customers' data. Participants will learn: • What actually happened in the Kaseya breach and how it compares to SolarWinds and the rest of the latest supply chain breaches • How to map your supply chain and know who your third parties are, as well as understand their possible impact • How to monitor the digital supply chain and your third parties’ cyber posture • How to conduct proper security risk management and remediation We’ll share our experience and expertise as security practitioners who have implemented our own mitigation strategies and helped our clients understand the impact of third-party security incidents. Can’t make it? Register anyway. We’ll send you the recording.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (23)
Subscribers (2122)
Panorays is dedicated to eliminating third-party cyber risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale the third-party security evaluation and management process so you can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance and improve your security across the board. Join us as we explore the risk inherent to your digital supply chain and discuss the transformation needed for modern day third-party security risk management—from automating security questionnaires, assessing third parties’ external attack surfaces, considering the criticality of the business relationship and more.