Blueprint: Build the Best in Cyber Defense cover image

Blueprint Live at the SANS Blue Team Summit 2023

Blueprint: Build the Best in Cyber Defense

00:00

How to Protect Your Intellectual Property in a Supply Chain Attack

When the SOC is confronted with a supply chain attack, either real or suspected, there are at least three separate and I would argue equally impended areas they need to look. The first is software bill of materials, what has the constituency acquired and what are the upstream dependencies of that from your jars to your nuggets to your whatever's. That's usually the first place we look. It should be leveraging its on-disk and in-memory instrumentation to look for telltale existence. So my advice is tick all three boxes and many sub boxes of each when you're in an incident of that sort.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app