Attacks like SolarWinds have revealed a hole in our defenses. With software updates on user machines, servers, and other portions of the network becoming a regular occurrence, a compromised update is a new and dangerous entry mechanism into your network.
It is imperative that SOC and Incident Response teams must begin to suspect software from external vendors as a point of entry when investigating security incidents on top of implementing zero-trust policies across the board.
In this webinar, you will have the opportunity to see a live investigation and mitigation of a live-fire supply chain attack, simulated on the cyber range included within Cyberbit.