Anatomy of a Breach - Supply Chain & Privilege

By Andy Thompson

Elevator Pitch

In this session, we deconstruct the SolarWinds and Codecov breaches to shed light on supply chain risk and the lure of identity compromise by breaking down the key phases of the attack - from initial infection and customer targeting, through privilege escalation to high value assets.

Description

Examining revelations from the SolarWinds and Codecov attacks, it’s clear that the compromise of identity and manipulation of privileged access were instrumental in their success. In this session, Andy Thompson of CyberArk Labs deconstructs these breaches to shed light on supply chain risk and the lure of identity compromise by breaking down the key phases of the attack - from initial infection and customer targeting, through privilege escalation to high value assets.