mlns='http://www.w3.org/1999/xhtml'>
Secrets of the world’s top threat actors
John, supply chain attacks are on the rise. Attackers are injecting malicious code into software and hardware components to create backdoors into the organization. As the Kaseya attack demonstrated, compromising a widely used product gives attackers privileged access into corporate networks. In this webinar, experts discuss the risks and threats to the supply chain and how enterprises need to shift their strategies to incorporate those challenges. Get tips on areas to focus on, and implementation recommendations to protect the supply chain. During this webinar you will: Get a guided tour of the deep and dark web, and learn the secrets of the world’s top threat actors. Find out how corporate access, and the cybercrime tools needed to steal it, is being freely bought and sold in underground hacker forums. Listen to expert advice for how enterprises can shore up software supply chains. |
|
|
|
Can’t attend the webinar? Register anyway and we’ll let you know when it is available on-demand. |
|
|
|
| Evan Blair General Manager, North America Searchlight Cyber |
|
|
|
|