Главная
Study mode:
on
1
Introduction
2
Caffeine
3
Questioning the Supply Chain
4
Measuring Caffeine in Coffee
5
How to Minimize Supply Chain Risks
6
Linux
7
Digital Supply Chain
8
Trust
9
Real World Attacks
10
Trusted Platform Module
11
Defending the Supply Chain
12
LVFS FWUPD
13
Inksy
14
MSI Breach
15
Black Lotus
16
FWUPD
17
Secure Boot
18
ThirdParty Software
19
Linux Example
20
Software Developed Inhouse
21
Vulnerability Management
22
Google Java in Python
23
Conclusion
24
Questions
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Learn essential strategies for protecting against supply chain attacks in this BSidesCharm conference talk. Explore the complexities of hardware, firmware, and software supply chains while discovering practical approaches to minimize trust and verify component integrity. Dive into open-source and free tools for device enumeration and validation, with real-world examples including the MSI breach and Black Lotus attacks. Master defensive techniques like Trusted Platform Module implementation, LVFS FWUPD usage, and secure boot configuration. Gain insights into vulnerability management, third-party software considerations, and in-house development security from security expert Paul Asadoorian, Principal Security Evangelist at Eclypsium and host of Paul's Security Weekly podcast. Examine Linux-specific examples and understand how to implement robust supply chain security measures across your technology stack.

Protecting Yourself From Supply Chain Attacks - Trust Is Overrated

BSidesCharm
Add to list