We're all familiar with the need to defend our own enterprise against adversaries, but it is important to understand how trusted friends can become foes. Software supply chain attacks are on the rise, and they exploit the vulnerable underbelly of many businesses: third-party software that may have been validated in the past but not at the time of an attack.
In this webinar, on 1 July at 10:00 AM CET, we won’t be talking about insider threats, but vulnerabilities that come from trusted vendors.
You'll learn:
Register here: Webinar Registration - Zoom