A Critical Assessment of Supply Chain Intrusion Vectors
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore a critical analysis of supply chain intrusion vectors in this 53-minute conference talk from BruCON Security Conference. Differentiate between software/hardware supply chain attacks and trusted third-party compromises, understanding their distinct characteristics and implications. Delve into the intricacies of physical and software supply chain attacks, examining their functionality, execution requirements, and practical challenges. Gain valuable insights into the often overhyped nature of these attacks and discover multiple defensive measures to detect and mitigate such threats. Learn to accurately assess the risk of supply chain compromise events and dispel the notion of a persistent "ghost in the machine." Equip yourself with the knowledge to precisely orient your organization's security strategy against supply chain vulnerabilities.
Syllabus
09 - BruCON 0x0D - A Critical Assessment of Supply Chain Intrusion Vectors - Joe Slowik
Taught by
BruCON Security Conference
Related Courses
The Evolution of the Software Supply Chain AttackPluralsight AI and Cybersecurity - The Twain Shall Meet
CAE in Cybersecurity Community via YouTube Whom Do You Trust - MSPs and Other Forgotten Risks for SMBs
RSA Conference via YouTube Code Dependency - Chinese APTs in Software Supply Chain Attacks
BSidesLV via YouTube Controlling the Source - Abusing Source Code Management Systems
Black Hat via YouTube