Organizations are increasingly being impacted by software supply chain risks from Kaseya to SolarWinds Orion. The discovery, inventory, control, and validation of software on your internal and on-premise attack surface has never been more important or challenging. When organizations lack visibility into their current inventory, these vulnerabilities can be exploited leading to a potential compliance violation, breach, or even ransomware. Learn tactics for understanding your software supply chain and staying in control of what software you have on your assets, both inside the network and outside, from the Internet.
What you will learn from the Webinar:
- Context on the most recent and relevant software supply chain attacks from the recent nodeJS library compromise to SolarWinds.
- How to identify whether your organization is vulnerable in response to a newly announced supply chain attack.
- How an ASM can help you discover vulnerable software you have in your inventory– both inside the network and outside.
Derek Abdine, CTO (Censys)
Eric Brewer, VP Infrastructure (Google)
Phil Venables, VP/CISO (Google Cloud)