Loading Events

IMA Webinar Broadcast: Supply Chain Compromise: How Threat Actors Leverage Trusted Relationships to Achieve Initial Access

March 26, 2021 @ 2:00 pm - 3:00 pm CDT

The threat of supply chain compromise represents a particularly nefarious issue for defenders, as it involves the compromise of a trusted third party through which the threat actor then subsequently compromises additional victims. To complicate things even more, the subsequent victims of these supply chain attacks are often unaware that they have been attacked in the first place due to the trusted nature of the relationship between the 3rd party victim and the supplier.

Accordingly, this brief will discuss CrowdStrike’s most current understanding of recent supply chain threats, to include the threat actors that perpetrate them, associated infrastructure and capabilities, as well as observed TTPs that are leveraged in the course of these advanced attacks
After registering, you will receive a confirmation email containing information about joining the webinar.

 

Objectives: 

This brief will discuss CrowdStrike’s most current understanding of recent supply chain threats, to include the threat actors that perpetrate them, associated infrastructure and capabilities, as well as observed TTPs that are leveraged in the course of these advanced attacks.

 

Presenters:

Adam Meyers, SVP, Intelligence at CrowdStrike

Adam Meyers leads the Threat Intelligence line of business for CrowdStrike. Meyers directs a team of cyber threat experts tracking cyber adversary groups across the globe and producing actionable intelligence to protect customers.

Zack Faase, RSM, Public Sector – CrowdStrike

As RSM Public Sector for CrowdStrike, Zack Faase, is responsible for CrowdStrike’s customer relationships in State & Local Government, Higher Education and K-12 in Wisconsin, Illinois, and Michigan.

Jay Fernandez, President – InfraGard WI Member Alliance

As the recently appointed President of the Wisconsin Chapter, Jay will only take a few minutes for a brief introduction.

 

Who should attend:

Open to anyone. Particularly aimed toward Cyber Resilience members, Network Security members, Vendor selection agents, Audit Compliance specialist.

 

Registration:

https://attendee.gotowebinar.com/register/8528282090305795085