Pen-Testing the Supply Chain

Broadcast on in Webcasts

Jan. 18, 2022 | Pen-Testing the Supply Chain


This webcast explores how to identify risks in your software supply chain through enhanced security testing and adversary simulation. Most corporate security tests today are limited in scope, focused largely on key priorities and critical assets within the immediate network environment. The limited nature of these tests results in many blind spots and unaddressed security problems, but one that is of particular importance today is the increasingly diverse, complex, and vulnerable software supply chain. Recent attacks on companies through these supply chains – SolarWinds, Kaseya, Codecov, etc. – demonstrate the urgency of this type of testing.

John Sawyer

Director of Red Team Services, IOActive

Protecting Data & the Supply Chain Ecosystem

data security DevSecOps penetration testing risk & vulnerability assessment supply chain

Share With Your Community