YoVDO

A Critical Assessment of Supply Chain Intrusion Vectors

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Cybersecurity Courses Risk Management Courses Attack Mitigations Courses Software Supply Chain Attacks Courses

Course Description

Overview

Explore a critical analysis of supply chain intrusion vectors in this 53-minute conference talk from BruCON Security Conference. Differentiate between software/hardware supply chain attacks and trusted third-party compromises, understanding their distinct characteristics and implications. Delve into the intricacies of physical and software supply chain attacks, examining their functionality, execution requirements, and practical challenges. Gain valuable insights into the often overhyped nature of these attacks and discover multiple defensive measures to detect and mitigate such threats. Learn to accurately assess the risk of supply chain compromise events and dispel the notion of a persistent "ghost in the machine." Equip yourself with the knowledge to precisely orient your organization's security strategy against supply chain vulnerabilities.

Syllabus

09 - BruCON 0x0D - A Critical Assessment of Supply Chain Intrusion Vectors - Joe Slowik


Taught by

BruCON Security Conference

Related Courses

Being a Cyberdefender - Behind the Curtains
BruCON Security Conference via YouTube
Bypassing Microsoft Defender for Identity
BruCON Security Conference via YouTube
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
BruCON Security Conference via YouTube
Android Malware Targeting Belgian Financial Apps
BruCON Security Conference via YouTube
Chasing the White Whale of Malware
BruCON Security Conference via YouTube