We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.

It’s Not Only Log4Shell: Handling Third-Party Security Risk

February 1, 2022
1hr

2021 will be remembered as the year of supply chain breaches—as well as vulnerabilities and backdoors in open-source code, software packages and containers. SolarWinds, Kaseya, Codecov, malicious NPM packages and of course, Log4J, are only a partial list of supply chain attacks and open source vulnerabilities that we saw.

Demi Ben-Ari and Lavi Lazarovitz will share their experience and expertise about the lessons learned from past breaches and exploitation of third-party code vulnerabilities and what actionable steps you can take to prepare for the inevitable attack vectors, exploitation and breaches we’re bound to see in 2022.

Join us as we discuss:

  • The details of the attack vectors, vulnerabilities, and exploits used in the latest breaches and vulnerabilities, including SolarWinds, CodeCov and Log4Shell
  • Third-party security risk and preparing for the next third-party vulnerability or breach
  • Actions to take when something like this happens, and how to minimize the blast radius
    It’s not a question of if it will happen, but when it will happen. This webinar will help you be prepared.

It’s not a question of if it will happen, but when it will happen. This webinar will help you be prepared.

Demi Ben Ari
Demi Ben-Ari Co-Founder & CTO @ Panorays
Lavi Lazarovitz - Head of Security Research at CyberArk Labs
Lavi Lazarovitz Head of Security Research @ CyberArk Labs

Fill out the form and watch now!

By clicking submit, I consent to the use of my personal data in accordance with Panorays Privacy Policy.