Hi [[ session.user.profile.firstName ]]

The Kaseya Breach: What Can You Do About a Supply Chain Attack?

Not much time has passed since the last supply chain cyber attacks: SolarWinds, Accellion, Codecov, and now Kaseya. Do you think this will be the last one? We don’t.

While you’re probably wondering what can be done to predict or prevent an incident like this in the future, we think the better question is: What can you do to prepare for the next one?

In this webinar, we’ll discuss what actionable steps you can take to respond to the next supply chain attack to mitigate compromising your data and your customers' data.

Participants will learn:
• What actually happened in the Kaseya breach and how it compares to SolarWinds and the rest of the latest supply chain breaches
• How to map your supply chain and know who your third parties are, as well as understand their possible impact
• How to monitor the digital supply chain and your third parties’ cyber posture
• How to conduct proper security risk management and remediation

We’ll share our experience and expertise as security practitioners who have implemented our own mitigation strategies and helped our clients understand the impact of third-party security incidents.

Can’t make it? Register anyway. We’ll send you the recording.
Recorded Jul 21 2021 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Demi Ben-Ari, Co-Founder and CTO, Panorays | James Azar, CISO - CISSP, Host of CISO Talk Podcast and CyberHub Podcast
Presentation preview: The Kaseya Breach: What Can You Do About a Supply Chain Attack?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Leveraging the CAIQ to Prepare for the Next Supply Chain Attack Recorded: Aug 5 2021 61 mins
    Demi Ben-Ari, Co-Founder and CTO, and Dov Goldman, Director of Risk & Compliance, Panorays
    Not much time has passed since the last supply chain cyberattacks: SolarWinds, Accellion, Codecov, and now Kaseya. Do you think Kaseya will be the last one? We don’t. While you’re probably wondering what can be done to predict or prevent an incident like this in the future, we think the better question is: What can you do to prepare for the next one?

    The CAIQ (Consensus Assessment Initiative Questionnaire) created by the CSA (Cloud Security Alliance) covers all of the possible security controls (CCM - Cloud Controls Matrix) that a company can have as a SaaS provider. By mapping all of the possible mitigation options, companies can reduce the risk of using these cloud and SaaS providers.

    In this webinar, we’ll discuss the usage of the CAIQ to be able to better prepare your organization for the next supply chain attack that happens—and it will. We’ll also provide some actionable steps you can take to respond to it when it happens and to mitigate compromising your data and your customers' data.

    Participants will learn:

    1. What actually happened in the recent Kaseya breach and how it compares to SolarWinds and the rest of the latest supply chain breaches
    2. How to map your supply chain and know who your third parties are, as well as understand their possible impact
    3. How to monitor the digital supply chain and your third parties’ cyber posture
    4. How to conduct proper security risk management and remediation
    5. How the CAIQ fits in this whole picture and how you can leverage it to be better prepared

    We’ll share our experience and expertise as security practitioners who have implemented our own mitigation strategies and helped our clients understand the impact of third-party security incidents.
  • The Kaseya Breach: What Can You Do About a Supply Chain Attack? Recorded: Jul 21 2021 62 mins
    Demi Ben-Ari, Co-Founder and CTO, Panorays | James Azar, CISO - CISSP, Host of CISO Talk Podcast and CyberHub Podcast
    Not much time has passed since the last supply chain cyber attacks: SolarWinds, Accellion, Codecov, and now Kaseya. Do you think this will be the last one? We don’t.

    While you’re probably wondering what can be done to predict or prevent an incident like this in the future, we think the better question is: What can you do to prepare for the next one?

    In this webinar, we’ll discuss what actionable steps you can take to respond to the next supply chain attack to mitigate compromising your data and your customers' data.

    Participants will learn:
    • What actually happened in the Kaseya breach and how it compares to SolarWinds and the rest of the latest supply chain breaches
    • How to map your supply chain and know who your third parties are, as well as understand their possible impact
    • How to monitor the digital supply chain and your third parties’ cyber posture
    • How to conduct proper security risk management and remediation

    We’ll share our experience and expertise as security practitioners who have implemented our own mitigation strategies and helped our clients understand the impact of third-party security incidents.

    Can’t make it? Register anyway. We’ll send you the recording.
  • How a 360-Degree View of Supplier Risk Can Save the Future of Your Company Recorded: Jul 1 2021 55 mins
    Kim Ann King, Senior Consultant, AimPoint Group / Demi Ben-Ari, Co-Founder and CTO, Panorays
    Not thoroughly checking the cyber posture of the vendors you work with could very well be putting your company’s future in jeopardy. That’s because not knowing the extent of third-party security risk opens you up to potential breaches and associated fines, lawsuits, loss of reputation and customer trust.

    For all of these reasons, it’s essential to have comprehensive, in-depth visibility into and control of third-party security risk. In this webinar, you’ll learn the steps to achieving this.

    Please join us to learn how to:
    • Identify and map vendors according to their inherent risk to your business
    • Scope risk controls according to the vendor relationship
    • Thoroughly assess your suppliers’ external attack surface
    • Create customized security questionnaires
    • Continuously monitor and remediate your vendors’ cyber gaps

    Find out how you can protect your company from the security risks introduced by your suppliers!
  • What Does Construction Have to Do with Third-Party Security? You’d Be Surprised Recorded: Jul 1 2021 58 mins
    Dov Goldman, Director of Risk & Compliance, Panorays | Andy Black, Head of Compliance & Info Sec., Sir Robert McAlpine
    In today’s cyber world, you know that third-party security is necessary for all industries–even construction. But implementing a process that thoroughly addresses vendor security risk can be challenging, especially when performed manually.

    In this webinar, you’ll learn how Sir Robert McAlpine, a UK-based construction and civil engineering company, succeeded in creating an automated, efficient third-party security process.

    You will learn how to:
    • Identify gaps in its third-party security risk management process
    • Set goals and requirements for the process, including easy collaboration, speed, cost-effectiveness and cyber risk visibility
    • Transition to a mature third-party security process

    If your organization is looking to create a third-party security risk management process, this webinar is for you!
Automate, Accelerate and Scale Your Third-Party Security Management
Panorays is dedicated to eliminating third-party cyber risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale the third-party security evaluation and management process so you can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance and improve your security across the board.

Join us as we explore the risk inherent to your digital supply chain and discuss the transformation needed for modern day third-party security risk management—from automating security questionnaires, assessing third parties’ external attack surfaces, considering the criticality of the business relationship and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Kaseya Breach: What Can You Do About a Supply Chain Attack?
  • Live at: Jul 21 2021 3:00 pm
  • Presented by: Demi Ben-Ari, Co-Founder and CTO, Panorays | James Azar, CISO - CISSP, Host of CISO Talk Podcast and CyberHub Podcast
  • From:
Your email has been sent.
or close