The Invisible Invasion: How Supply Chain Attacks Slip Past Defenses
This event qualifies for:
Today’s most dangerous cyberattacks don’t break through your defenses — they quietly slip past them.
Join us for this upcoming live panel discussion, where cybersecurity experts unpack how attackers are increasingly exploiting trusted vendors, third-party software and hidden dependencies to gain access without detection.
This event will feature insider perspectives from former supply chain and ransomware experts of the SSA, NSA and FBI, while exploring how modern supply chain threats operate, why traditional security tools fail to catch them and where organizations unknowingly expose themselves to risk.
During this session, attendees will walk away with:
- A clear understanding of today’s evolving supply-chained focused ransomware
- Insight into how attackers leverage “inherited trust” to bypass defenses
- A step-by-step view of how a supply chain attack unfolds in real time
- The hidden risks lurking beyond your immediate vendor ecosystem
- Practical strategies to shift from trust-based to intelligence-driven security
As supply chain attacks grow more sophisticated and impactful, organizations must rethink how they identify, monitor and respond to third-party risk. This panel discussion will equip you with the knowledge to move beyond reactive defenses and gain the visibility needed to stop threats before they spread.
Reserve your spot and take the first step toward uncovering the risks others miss.
Speaker Details
Timothy Amerson
Megan Rolander
Michele Iversen
Nikhil Gupta
Event Topic
CybersecurityRelevant Audiences
All State and Local Government, All Federal Government