Overview
Explore a real-life example of dependency hijacking in Microsoft Teams in this 56-minute Linux Foundation talk sponsored by Contrast Security. Delve into the intricacies of supply chain vulnerabilities as Contrast Security's Director of Security Research, Matt Austin, and Director of Enterprise Security, Adam Schaal, guide you through the process. Learn about various types of supply chain attacks, including hardware, software, and side-channel attacks, and understand their potential impact. Discover how supply chain vulnerabilities can be introduced and gain insights into protecting your infrastructure, SDLC, and code. Examine the broader implications of supply chain security and stay informed about recent developments in this critical area of cybersecurity.
Syllabus
Intro
WHAT IS A SUPPLY CHAIN?
DEVASTATING FOOD SHORTAGES
HOW DOES IT RELATE TO YOU?
FAMOUS HARDWARE SUPPLY CHAIN ATTACKS
FAMOUS SOFTWARE SUPPLY CHAIN ATTACKS
FAMOUS SIDE CHANNEL SUPPLY CHAIN ATTACKS
SCOPE TOO LARGE
HOW CAN SUPPLY CHAIN VULNS BE INTRODUCED...
HIJACKING DEPENDENCIES TO EXPLOIT MICROSOFT TEAMS
PROTECT YOUR INFRASTRUCTURE
PROTECT YOUR SDLC
PROTECT YOUR CODE
MOVEMENT IN THIS SPACE
Taught by
Linux Foundation