Code to Cloud Security Hour Series: Detecting and Preventing Supply Chain Attacks

Jun 
23rd
Join Us
Text goes here
X
Register Now
Text goes here
X
About

Code to Cloud Security Hour Series: Detecting and Preventing Supply Chain Attacks

Available on-demand now
08
/
30
 – 
08
/
31
Register
Text goes here
X

All software supply chain attacks share a core trait in common: they allow threat actors to break into organizations’ IT estate by exploiting vulnerabilities in software created by other entities, not the business itself.

 

However, the types of vulnerabilities that attackers may exploit during supply chain incidents come in many forms. The exploitation methods that attackers use to execute supply chain incidents also vary. For these reasons, protecting your business against supply chain threats requires understanding the most common software supply chain attack paths and deploying a multi-pronged defense against all of them.


With that in mind, our Cloud Security Architect, Sai Krishna Kumar will walk through the common supply chain attack paths, compare and contrast the severity of each type of attack, and discuss best practices to prevent attack &  vulnerabilities.


Register and attend the entire series to earn points for every engagement with us. At the end of the year, our top three winners will win an exclusive Prisma Cloud premium!

Sai Krishna Kumar

Cloud Security  Architect, Prisma Cloud

Palo Alto Networks

Thank You

[confirmation_headline]
[confirmation_messaging]
Watch now
Text goes here
X

All software supply chain attacks share a core trait in common: they allow threat actors to break into organizations’ IT estate by exploiting vulnerabilities in software created by other entities, not the business itself.

 

However, the types of vulnerabilities that attackers may exploit during supply chain incidents come in many forms. The exploitation methods that attackers use to execute supply chain incidents also vary. For these reasons, protecting your business against supply chain threats requires understanding the most common software supply chain attack paths and deploying a multi-pronged defense against all of them.


With that in mind, our Cloud Security Architect, Sai Krishna Kumar will walk through the common supply chain attack paths, compare and contrast the severity of each type of attack, and discuss best practices to prevent attack &  vulnerabilities.


Register and attend the entire series to earn points for every engagement with us. At the end of the year, our top three winners will win an exclusive Prisma Cloud premium!

PSE Associate Platform Prep and Online Testing

We look forward to seeing you in

The Final Countdown!
Time left for the event days hours minutes seconds
The countdown doesn't work if the event start date is set to TBD

PSE Associate Platform Prep and Online Testing

Palo Alto Networks
Register now
Text goes here
X
About

Copyright © 2023 Palo Alto Networks. All rights reserved

Privacy
Text goes here
X
Contact Us
Text goes here
X
Terms of Use
Text goes here
X
Link Text
Text goes here
X

Self-parking validation tickets available at event registration upon check-in

Registration is complimentary for all attendees. Justification Letter for Cloud Security Summit. Palo Alto Networks, Inc.'s internal policies strictly limit the types of amenities it can provide to federal, state and local government, and education customers. These policies are in place to ensure that all business sectors are undertaken with the utmost respect to the applicable laws and regulations surrounding the provision of amenities to those customers. By accepting any item of value in connection with this event, you are specifically representing that Palo Alto Networks' offering and your acceptance of it is in copmliance with your organizations' legal and ethical guidelines. This event is not open to K-12 or Library customers. Should you ahve any questions in regard to this event, please contact your Palo Alto Networks sales representative.

Share with Friends
Facebook
Twitter
LinkedIn
Link
CONTACT THE ORGANIZER
Google   Outlook   iCal   Yahoo

RSVP

Google Icon
Google
Outlook Icon
Outlook
Apple Icon
Apple
Yahoo Icon
Yahoo