SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsSupply Chain Attacks (also called 3rd Party Attacks) are becoming more common as the numbers of outsourced services increases and attackers see these as ways to circumvent your primary security barriers. When one of your suppliers are compromised you need to kick off several key urgent risk related tasks that we have summarized on this cheat sheet. Your immediate objective is to understand your exposure to them and any attacker leveraging their access and permissions into your network or cloud data. This sheet is used in the 4-lab deep dive on Supply Chain attacks, in LDR553: Cyber Incident Management, were we assess, investigate, plan, and document our response and risks. Even if you can’t make the course, you can still benefit from the structured high-level Incident Management Plan.


Steve brings 25+ years of cybersecurity experience, including 14+ years in incident response and management. After serving in the UK Royal Air Force, where he led penetration testing teams, he gained expertise in managing cyber incidents globally.
Read more about Steve Armstrong-Godwin















