YoVDO

Whom Do You Trust - MSPs and Other Forgotten Risks for SMBs

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Social Engineering Courses Privacy Courses Endpoint Security Courses Multifactor Authentication Courses Software Supply Chain Attacks Courses

Course Description

Overview

Explore the critical cybersecurity risks facing small and medium-sized businesses (SMBs) in this 55-minute webcast from RSA Conference. Delve into the growing threat of cybercriminals targeting Managed Service Providers (MSPs) to compromise their SMB customers through supply chain attacks. Examine the appeal of MSPs to attackers due to economies of scale and pre-installed automation tools. Learn about the biggest risks to SMBs from trusted dependencies and discover practical strategies to mitigate these threats. Gain insights into endpoint security challenges, the evolving threat landscape, and real-world examples like the Cassia Revile Breach. Understand the dangers of software supply chain attacks, remote management tool vulnerabilities, and social engineering tactics. Explore the importance of multifactor authentication, privacy considerations, and consolidation in cybersecurity. Conclude with actionable protection measures to enhance SMB security posture against these often-overlooked risks.

Syllabus

Intro
Small companies are not a target
How often have you been attacked
Challenges for SMBs
Endpoint security
Can it all be good
Threat landscape
Trust
Attackers
MSP Stress
Cassia Revile Breach
How it happened
Software supply chain attacks
Misusing your environment
Lock for Gel vulnerability
Backup vulnerability
Remote management tools
Social engineering
Password stuffing
Multifactor authentication
Privacy
Consolidation
Protection
Action Items
Outro


Taught by

RSA Conference

Related Courses

The Evolution of the Software Supply Chain Attack
Pluralsight
AI and Cybersecurity - The Twain Shall Meet
CAE in Cybersecurity Community via YouTube
Code Dependency - Chinese APTs in Software Supply Chain Attacks
BSidesLV via YouTube
A Critical Assessment of Supply Chain Intrusion Vectors
BruCON Security Conference via YouTube
Controlling the Source - Abusing Source Code Management Systems
Black Hat via YouTube