webinar register page

Webinar banner
A Year After SolarWinds: Which Way Do They Blow?
According to Microsoft, one of the victims of the 2020 SolarWinds hack, the same Russian intelligence agencies are actively targeting technology companies that resell and provide cloud services for customers. The group continues to replicate previously successful approaches by targeting organizations integral to the global IT supply chain. In this case, this latest spying campaign by the Russian SVR appears to be driven by traditional espionage objectives, and out of the 141 companies Microsoft notified, only about 14 concluded there might have been a successful compromise, with limited impact. The targets — cloud service providers — are particularly attractive targets as bad actors focus on the all-important supply chain to try and gain access to the cloud to take down clients that include government agencies.

In this discussion, we’ll cover how these attacks are orchestrated at a technical level - including infiltrating the software development life cycle process in the supply chain of so many technology companies. We’ll discuss the possible avenues of approach and their legal implications when Microsoft or the FBI calls with these kinds of warnings and also discuss best practices for disrupting nation-state level attacks against the technology supply chain.

Jennifer DeTrani, General Counsel, Nisos
Justin Zeefe, President and Co-Founder, Nisos
Kamal Ghali, Partner, Bondurant Mixson & Elmore
Jan Grzymala-Busse, Director of Data Protection, Finance Industry
Shawn Valle, CISO, Tricentis
Evan Wolff, Partner, Crowell and Moring

Jan 25, 2022 02:00 PM in Eastern Time (US and Canada)

* Required information