Software supply chain attacks are rapidly becoming the most successful initial intrusion vector for cyberattackers. Every third-party app, open source package, and SaaS being used by the enterprise represents an attack surface that adversaries can use to break in undetected and steal data or execute massive ransomware campaigns. This rapidly evolving style of attack requires new ways of thinking about prevention, detection, and response.
This panel will discuss: