Главная
Study mode:
on
1
Introduction
2
John Sawyer
3
Overview
4
Paradigm Shift
5
Supply Chain Vulnerability
6
How far does the supply chain go
7
Supply chain risks
8
Supply chain security
9
Minecast compromise
10
Minor Enterprise Attack Framework
11
Supply Chain Compromise
12
Supplier Attacks
13
Software Vulnerabilities
14
Example of a Compromise
15
What Can You Do
16
Vendor Risk Assessments
17
Policies
18
Intelligence gathering
19
Different areas of testing
20
Security
21
Penetration Testing
22
Source Code Security
Description:
Explore how to identify risks in your software supply chain through enhanced security testing and adversary simulation in this one-hour webcast presented by John Sawyer, Director of Red Team Services at IOActive. Delve into the limitations of current corporate security tests and the resulting blind spots, particularly in the increasingly diverse, complex, and vulnerable software supply chain. Examine recent high-profile attacks like SolarWinds, Kaseya, and Codecov to understand the urgency of supply chain testing. Learn about the paradigm shift in supply chain vulnerability, assess the extent of your supply chain, and identify associated risks. Discover the Minecast compromise and the Minor Enterprise Attack Framework. Gain insights into supplier attacks, software vulnerabilities, and real-world compromise examples. Acquire practical knowledge on implementing vendor risk assessments, policies, intelligence gathering, and various testing areas including security, penetration testing, and source code security to enhance your organization's supply chain defenses. Read more

Pen-Testing the Supply Chain

RSA Conference
Add to list