1. Online Only

This year has unveiled itself as the year supply chain attacks became a trend in the malware world. Attackers are exploiting the trust model users have in software companies to implant malware into systems. As a result exploitation can occur at a massive scale and go undetected for long periods of time. This talk will explore examples of these attacks and look at ways to defend against them.

Learning Objectives:
1: Understand the risk and threat posed by supply chain attacks.
2: Understand the difficultly detecting supply chain attacks.
3: Grok how to defend against supply chain attacks.

Download pdf
Participants: