Overview
This course aims to provide a critical assessment of supply chain intrusion vectors. The learning outcomes include understanding the distinction between software/hardware supply chain attacks and trusted third-party compromises, analyzing the functionality and execution of supply chain attacks, and gaining insight into the difficulty of executing such attacks and the defensive measures available. The course teaches skills such as identifying supply chain compromise events and mitigating the risk of such attacks. The teaching method involves detailed analysis and discussion of supply chain attack types. The intended audience includes defenders, information security stakeholders, and individuals interested in cybersecurity threats and defenses.
Syllabus
09 - BruCON 0x0D - A Critical Assessment of Supply Chain Intrusion Vectors - Joe Slowik
Taught by
BruCON Security Conference