WEBINAR

How Continuous Validation Helps Protect the Supply Chain

May 01, 2021
59 Min

Title: How Continuous Validation Helps Protect the Supply Chain

Presenters: Matt Shelton, Director, Technology Risk and Threat Intelligence, FireEye

Date:On-Demand

Abstract:

The Expanding Attack Surface: How Continuous Validation Helps Protect the Supply Chain

Organizations are increasingly using third party providers to manage critical components of their infrastructure. The introduction of cloud services, managed service providers, and Software-as-a-Service (SaaS) has increased the size of an organization’s attack surface. A breach of proprietary and confidential information is just as impactful coming from the supply chain as it is from an organization’s infrastructure. Join Matt Shelton, Director, Technology Risk and Threat Intelligence, as he explains how intelligence-led validation can help tighten controls and reduce risk. In this webinar:

  • Hear about the realities of today’s threat landscape, sophisticated attackers and the implications on managing your security stack and processes
  • Learn how threat intelligence helps you take decisive action
  • Find out how continuous validation helps you understand the true measure of your security
  • Get insights into an actual use case where a company’s supply chain was breached to see how intelligence-led validation could have helped prevent it

Watch on Demand