
Cyber attack on the supply chain: What happens if your supplier has been compromised?
How does this affect your safety and productivity?
Our expert explains how attackers work in new ways.
Topic
Awareness / Phishing / FraudData security / DLP / Know-how protectionGovernance, Riskmanagement and ComplianceNetwork Security / Patch ManagementSIEM / Threat Analytics / SOCTrend topic
When & Where
Details
Format:
Management lecture
Session description
The advancing digitization has created complex global supply chains whose vulnerability has become clear as a result of the crises of recent years. However, more and more targeted attacks on supply chains can also be observed in cyberspace. Usually with devastating effects, not only for the companies affected, but also for their customers and partners. Since those affected fear a significant loss of reputation in addition to enormous financial damage, they do not always communicate attacks to their stakeholders.
Although indirect attacks are already dominating today's threat landscape, most companies still focus primarily on the security of their own IT systems and neglect the continuous monitoring of their entire supply chain. Supply chain attacks have therefore bee ...
Although indirect attacks are already dominating today's threat landscape, most companies still focus primarily on the security of their own IT systems and neglect the continuous monitoring of their entire supply chain. Supply chain attacks have therefore bee ...
Moderator
