Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Protecting Yourself From Supply Chain Attacks - Trust Is Overrated

BSidesCharm via YouTube

Overview

Learn essential strategies for protecting against supply chain attacks in this BSidesCharm conference talk. Explore the complexities of hardware, firmware, and software supply chains while discovering practical approaches to minimize trust and verify component integrity. Dive into open-source and free tools for device enumeration and validation, with real-world examples including the MSI breach and Black Lotus attacks. Master defensive techniques like Trusted Platform Module implementation, LVFS FWUPD usage, and secure boot configuration. Gain insights into vulnerability management, third-party software considerations, and in-house development security from security expert Paul Asadoorian, Principal Security Evangelist at Eclypsium and host of Paul's Security Weekly podcast. Examine Linux-specific examples and understand how to implement robust supply chain security measures across your technology stack.

Syllabus

Introduction
Caffeine
Questioning the Supply Chain
Measuring Caffeine in Coffee
How to Minimize Supply Chain Risks
Linux
Digital Supply Chain
Trust
Real World Attacks
Trusted Platform Module
Defending the Supply Chain
LVFS FWUPD
Inksy
MSI Breach
Black Lotus
FWUPD
Secure Boot
ThirdParty Software
Linux Example
Software Developed Inhouse
Vulnerability Management
Google Java in Python
Conclusion
Questions

Taught by

BSidesCharm

Reviews

Start your review of Protecting Yourself From Supply Chain Attacks - Trust Is Overrated

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.