Supply Chain Risks: When The Vendors Are an Attack Vector
About This Session
This panel addresses the very real, very messy cyber gremlins that can introduce vulnerabilities into critical Operational Technology (OT) environments. Using examples Such as SolarWinds, NotPetya, and the 2024 Lebanon electronic device attacks, we’ll discuss real-world challenges and best practices to secure each link of the supply chain, including threat modeling for vendors, zero-trust approaches for third-party vendors, and compliance with frameworks such as NIST 800-161, IEC 62443, and Executive Order 14028.
Speaker
Greg Houser
Senior Cybersecurity Engineer - exida
Greg is a Senior Cybersecurity Engineer with exida. With over 20 years of experience, Greg has worked in both IT and OT environments, for clients in government, commercial, and industrial sectors. During his career, Greg has had the opportunity to work as an accreditor, cybersecurity tester, security architect, integrator, and administrator, and brings these unique experiences and viewpoints to his approach to cybersecurity.
