Ghosts in the Software Supply Chain: How To Stop Stealthy Cyberattacks

Logo
Presented by

Chase Snyder,Sr. Marketing Mangr,ExtraHop; Opal El, Info Systems Engineer; Marcos Saiz, Mngr TBConsulting;B Dunlap, Moderator

About this talk

The 2022 Verizon Data Breach Investigation Report showed that supply chain was responsible for 62% of System Intrusion incidents in the past year. For cyberattackers, using the software supply chain is increasingly successful and popular, since it reduces the likelihood of detection and delivers privileged access into many targets at once. Incident responders can see major improvements by focusing on network activity. On September 1, 2022 at 1:00 p.m. Eastern/10:00 a.m. Pacific, ExtraHop and (ISC)² host a panel that will discuss how to intercept software supply chain attacker strategies, using recent and historical examples as a foundation. Join us to hear this timely discussion.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (190)
Subscribers (138137)
ISC2 hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.