Back to All Events

SANS Supply Chain Cybersecurity Summit


  • The Westin Arlington Gateway 801 N Glebe Rd Arlington, VA 22203 US United States (map)
350x200_No-Info_Supply-Chain-Summit-2019.jpg

SANS Supply Chain Cybersecurity Summit
@SANSInstitute

Secure Your Supply Chain

  • Experience two days of in-depth Summit presentations (Aug 12-13) and interactive discussions → VIEW AGENDA

  • Enhance your experience with a closely aligned, immersive SANS course (Aug 14-19) following the Summit → VIEW COURSES

  • Enjoy networking opportunities and community events

Your supply chain is an overlooked threat vector.

Recent high-profile security breaches starkly illustrate the growing concern around supply chain cyber security. Adversaries are exploiting suppliers and vendors to gain access and damage their intended target. It’s a viable threat vector because most organizations are not able to monitor and assess every third party in their supply chain. To effectively safeguard against this growing risk, security teams have adopted an integrated approach that leverages controls and processes to ensure third-party organizations are meeting established security requirements.

Hear from the experts—learn how to better defend your supply chain.

The Supply Chain Cybersecurity Summit will bring together leading security practitioners to explore practical methods for protecting products, networks, and data from supply chain attacks. Experts will draw upon their own experiences and recent notable breaches as they provide concrete strategies and tools that can be used to assess, detect, and resolve third-party vulnerabilities.

Explore a wide range of topics:

  • Supply chain attacks: Hardware and software

  • Subversion at points of design, manufacture, service, distribution, and disposal

  • Lessons learned from recent supply chain attacks, such as NotPetya

  • Third-party risk assessment and vulnerability management

  • Software updates

  • Threat hunting in the supply chain

  • Concerns with 5G implementation

  • Backdoors and bug doors

  • Remote support to products and devices

  • Out-of-date and abandoned software