Supply Chain Attacks
Attacks on and protection of supply chains
Topic
Data security / DLP / Know-how protectionTrend topic
When & Where
Details
Format:
Lecture
Session description
Incidents such as Solarwinds or the attack on Linux XZ Utils have put the topic of “supply chain attacks” on the agenda in many organizations.
But what characterizes such attacks, what specific examples have there been in the past, and how should they be dealt with? In this deep dive session, Stefan Strobel describes numerous supply chain attacks from the past and highlights the specific characteristics and different variants of these attacks. He also presents various protective measures and their limitations in relation to supply chain attacks and recommends strategies for securing the supply chain.
Sponsored by