
Sign up to save your podcasts
Or


The Solarwinds breach raised the visibility of Software supply chain risks, as many organizations employ third party software with potential access to sensitive information. Join the CISO of Solarwinds as he discusses what happened during the attack, the lessons learned, the mitigations employed after the attack, and excellent, transparent actions for organizations to manage software development and distribution processes.
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
Show Notes: https://securityweekly.com/csp78
By SC Media4.7
1313 ratings
The Solarwinds breach raised the visibility of Software supply chain risks, as many organizations employ third party software with potential access to sensitive information. Join the CISO of Solarwinds as he discusses what happened during the attack, the lessons learned, the mitigations employed after the attack, and excellent, transparent actions for organizations to manage software development and distribution processes.
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
Show Notes: https://securityweekly.com/csp78

73 Listeners