Learn how to discover your organization’s digital assets and third-party attack surface. READ NOW >>

TPSRM Fundamentals TPSRM Fundamentals
< Back to Webinars
April 21, 2022

Dealing with the “New Normal” of Supply Chain Security Risk

April 21, 2022

The “new normal” elicits many different thoughts and emotions about the world that was and the world that is. Along with other upheavals that we’ve experienced over the past year or so are the disastrous effects of numerous far-reaching supply chain breaches and third-party code vulnerabilities. 

SolarWinds, Kaseya, Codecov and Log4j have become household names in the business world, even among non-tech professionals. Unfortunately, we can only expect that list to get longer as we anticipate more similar attacks. How can we learn from these past cyber events and prepare—with the right people, processes, and tools—for what’s yet to come?

Find out: 

  1. What actually happened with SolarWinds, CodeCov and Log4Shell.
  2. What you can do to prepare for the next third-party cyber incident.
  3. The different components of supply chain security in the CI/CD pipeline and how developers can be a part of your security program
  4. How to take action when a supply chain attack happens, and how to minimize the blast radius.

Get actionable guidance and tips on how to best reduce supply chain risk and contain a breach when it (inevitably) occurs.

Speakers

Demi Ben-Ari
Co-Founder and CTO
Barak Schoster
Senior Director, Chief Architect Bridgecrew, Palo Alto Networks

Duration

48 min

The “new normal” elicits many different thoughts and emotions about the world that was and the world that is. Along with other upheavals that we’ve experienced over the past year or so are the disastrous effects of numerous far-reaching supply chain breaches and third-party code vulnerabilities. 

SolarWinds, Kaseya, Codecov and Log4j have become household names in the business world, even among non-tech professionals. Unfortunately, we can only expect that list to get longer as we anticipate more similar attacks. How can we learn from these past cyber events and prepare—with the right people, processes, and tools—for what’s yet to come?

Find out: 

  1. What actually happened with SolarWinds, CodeCov and Log4Shell.
  2. What you can do to prepare for the next third-party cyber incident.
  3. The different components of supply chain security in the CI/CD pipeline and how developers can be a part of your security program
  4. How to take action when a supply chain attack happens, and how to minimize the blast radius.

Get actionable guidance and tips on how to best reduce supply chain risk and contain a breach when it (inevitably) occurs.

Building Trust Between Companies Worldwide

We use cookies to ensure you get the best experience on our website. Visit our Cookie Policy for more information.