Exorcising the Ghost in the Machine: Debunking Myths around Supply Chain Attacks

Supply chain attacks appear to be among the most concerning threat vectors for many organizations - yet most descriptions of such threats appear to either ignore or be ignorant of the actual steps required to actualize an implant for offensive purposes. This talk will examine how a physical supply chain attack (e.g., modification of device hardware, firmware, or “adding a rice-sized chip” to a motherboard) works in practice, and how adversaries might actually use such access. Based on this exploration, defenders can gain insight as to the true scope and meaning of such attacks, as well as learn the multitude of defensive measures that can be applied to counteract such attacks even if they are successful.

Register Today!