Dealing with the “New Normal” of Supply Chain Security Risk

Logo
Presented by

Barak Schoster, Sr Director, Chief Architect at Bridgecrew, Palo Alto Networks | Demi Ben-Ari, Co-Founder and CTO at Panorays

About this talk

The “new normal” elicits many different thoughts and emotions about the world that was and the world that is. Along with other upheavals that we’ve experienced over the past year or so are the disastrous effects of numerous far-reaching supply chain breaches and third-party code vulnerabilities. SolarWinds, Kaseya, Codecov and Log4j have become household names in the business world, even among non-tech professionals. Unfortunately, we can only expect that list to get longer as we anticipate more similar attacks. How can we learn from these past cyber events and prepare—with the right people, processes, and tools—for what’s yet to come? Find out: • What actually happened with SolarWinds, CodeCov and Log4Shell. • What you can do to prepare for the next third-party cyber incident. • The different components of supply chain security in the CI/CD pipeline and how developers can be a part of your security program • How to take action when a supply chain attack happens, and how to minimize the blast radius. Get actionable guidance and tips on how to best reduce supply chain risk and contain a breach when it (inevitably) occurs.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (23)
Subscribers (2114)
Panorays is dedicated to eliminating third-party cyber risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale the third-party security evaluation and management process so you can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance and improve your security across the board. Join us as we explore the risk inherent to your digital supply chain and discuss the transformation needed for modern day third-party security risk management—from automating security questionnaires, assessing third parties’ external attack surfaces, considering the criticality of the business relationship and more.