Pen-Testing the Supply Chain

Pen-Testing the Supply Chain

RSA Conference via YouTube Direct link

What Can You Do

15 of 22

15 of 22

What Can You Do

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Pen-Testing the Supply Chain

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 John Sawyer
  3. 3 Overview
  4. 4 Paradigm Shift
  5. 5 Supply Chain Vulnerability
  6. 6 How far does the supply chain go
  7. 7 Supply chain risks
  8. 8 Supply chain security
  9. 9 Minecast compromise
  10. 10 Minor Enterprise Attack Framework
  11. 11 Supply Chain Compromise
  12. 12 Supplier Attacks
  13. 13 Software Vulnerabilities
  14. 14 Example of a Compromise
  15. 15 What Can You Do
  16. 16 Vendor Risk Assessments
  17. 17 Policies
  18. 18 Intelligence gathering
  19. 19 Different areas of testing
  20. 20 Security
  21. 21 Penetration Testing
  22. 22 Source Code Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.