While supply-chain attacks are nothing new, events over the last year have raised their visibility significantly. For many organizations, a complex software supply chain or risk management program that has not fully addressed this, defending against these attacks may seem hopelessly complex. But defending against attacks that exploit your supply chain is not impossible and properly securing your organization requires this. In this discussion, we'll explore these attacks and defense strategies from the perspectives of former security auditors with roles as security officers and data governance heads.
- Understand what supply-chain attacks are and how they work
- Learn how to evaluate the software supply chain in your organization
- Assess the threats to your software supply chain and consider how to mitigate them
- Incorporate software supply-chain security into ongoing security and governance programs