Technical Tactics of Supply Chain Compromises

WEBINAR | On Demand

Software supply chain attacks are uniquely capable of breaching even the most well defended organizations. In fact, they’re purpose built to do so. 

They bypass prevention mechanisms that rely on signatures or ML classifiers by abusing the trust granted to the software they’ve compromised.  They avoid detection by exhibiting malicious behavior only when it’s too late for remediation. 

There’s a reason these attacks are on the rise…they tend to work, and understanding how they work is the first step to stopping them.

In this webinar, two software supply chain security experts, Jasmine Noel and Joshua Knox, offer a crash course on the technical tactics of these types of compromises and demonstrate how to assess the risks posed by open source and commercial software.

Their technical insights and actionable recommendations will enable you to position your organization to handle this growing threat.

What you will learn:
✓  Tactics used to attack & compromise software supply chains
✓  How to analyze software to detect threats embedded by these tactics
✓  What information is needed to verify software is safe to release or deploy

✓  How this risk analysis is different from other software testing techniques

Watch On Demand!

Watch On Demand