Solarwinds Breach
In December of 2020, a sophisticated supply chain attack was exposed by industry leading information security firm, FireEye. FireEye discovered the attack because this attack had breached their own network. Later Solarwinds was revealed as the reason for the breach.
425 of the Fortune 500 companies utilize Solarwinds software. What happens when that software company is infiltrated by attackers? They plant a back door into the code.
This discover and announcement rocked the security world. We are going to discuss the real world impact for companies in Indiana.
We will hear from individuals who utilized Solarwinds. What actions did they take? What were the indicators of compromise?
This attack also brings up some larger questions. What other software could be vulnerable to this? Does this boost the case for the open source community?
IT always preaches update, update, update your software. This attack flipped that on its head. If your Solarwinds software was out of date, you are probably unaffected. How does that impact the psyche of IT professionals. We are paranoid enough already.
We talk through these questions and more. We will tell you what we know. If you have questions about the breach, we hope to provide you with answers.
Directions
The AI Revolution
November ISSA Event
Cybersecurity Joint Meeting w REF CIO Forum and ISSA
State of Cybersecurity
Mobile Security
Reducing Microsoft 365 Risk
A Journey to the Cloud
Protecting Your Organization with MDR
Cyber Insurance Insights
Zero Trust Segmentation
2022 Year End Celebration
Cybersecurity Rants... And Other Topics of Interest
Healthcare Cybersecurity Summit
When It's OK to Lie: Not Your Father's Honeypot
Reacting to Cyber Threats
SOC - Buy vs Build
MSU Interdisciplinary Conference on Cybercrime
BSides Fort Wayne
Cybersecurity Alphabet Soup
Cyber Insurance in a Ransomware World
Are you out of your Trust but Verifying Mind
Solarwinds Breach
O365 Cloud Security
Anatomy of a Hack
Cloud Service Providers Webinar
COVID-19 Webinar
Cyber Wellness
NEIN-ISSA Holiday Networking Event
Rolling Cyber Security into Risk Management
IoT - from the Edge, through the Fog, and to the Cloud
Indiana InfraGard
Northeast IN Year End Celebration
Lifeline Data Center Tour
Social Gathering
Privileged Account Management: A Sprint Approach
Securing the Internet of Things
The who, what, where and why of SIEM
Northeast Indiana ISSA Holiday Celebration 2017
Understanding Penetration Testing
IT and Finance: Bridging the Knowledge Gap
ISSA NE IN - Social
Compliance and Regulations
Preventing Data Disasters
20 Critical Security Controls
Ransomware and Drinks
Meet the President of ISSA Int'l
Networking Event
Hyper Converged Solutions
3D Printing Demo
Ransomware Roundtable