How Dark Web Credentials Lead to a Software Supply Chain Attack

Logo
Presented by

CyberArk

About this talk

Organizations are experiencing an explosion of human and machine identities, driven by digital initiatives and rapid innovation. This in turn has significantly increased exposure to ransomware, software supply chain attacks and other threats, giving rise to a new generation of cyber criminals. Cyber criminals continuously seek to make their attacks more resilient, more disruptive and harder to counter. Harder yes, but not impossible. Our extensive security experience is rooted in protecting privileged access, a practice that must extend beyond the IT admin to all identities – human and machine. For a reality-based experience with timely defense insights, we tap current CyberArk Labs research on threats seen and experienced in the wild, as well as insights gained from actual breaches our incident responders have addressed. We will simulate a head-to-head battle. In this session, our team will simulate a software supply chain attack in which an attacker uses credentials obtained on the dark web to breach a managed service provider (MSP) and execute ransomware on an unsuspecting customer.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (41)
Subscribers (2758)
Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity - seamlessly securing human and machine identities accessing workloads from hybrid to multi-cloud, and flexibly automates the identity lifecycle all with continuous threat detection and prevention – protecting organization’s identities and most critical assets by enabling Zero Trust and enforcing least privilege.