Главная
Study mode:
on
1
Introduction
2
The World Lives On A Giant Turtle
3
Its Turtles All The Way Down
4
Your Supply Chain
5
GitHub
6
Office
7
LinkedIn
8
Supply Chain Risk
9
Software
10
Defending Microsoft
11
Defending the Cloud
12
Cyber Defense Operations Center
13
The world needs more acronyms
14
People
15
Whats your risk
16
Assume breach
17
Remote viewing software
18
Practical advice
19
Services
20
Inventory
21
Blackout
22
Jumping Hardware
23
IOT
24
flickering
25
technology
26
my daughter
27
culture
28
response matters
29
best practices
30
the small stuff
31
embrace the whole
Description:
Explore modern supply chain attacks and defense strategies in this 51-minute Black Hat conference talk. Gain practical guidance on defending against and responding to supply chain compromises, applicable to both SecOps and App Development professionals. Delve into real-world examples from GitHub, Office, and LinkedIn to understand supply chain risks. Learn about Microsoft's defense strategies, cloud security, and the importance of Cyber Defense Operations Centers. Examine the role of people in security, risk assessment techniques, and the concept of "assume breach." Discover practical advice on inventory management, services, and hardware security, including IoT considerations. Understand the significance of organizational culture and response strategies in cybersecurity. Leave with actionable insights on best practices, addressing small details, and embracing a holistic approach to supply chain security.

The Enemy Within - Modern Supply Chain Attacks

Black Hat
Add to list