Listen to The Threat Talks on:
Supply Chain: Business as usual?
Your cybersecurity experts
Lieuwe Jan Koning
Co-Founder and CTO ON2IT
Luca Cipriano
Threat Intel Specialist ON2IT

Matthijs Zwart
CIO and CISO Vitens
Supply chain: Business as usual?
As reliance on third-party and open-source software grows, so does the risk of supply chain attacks, where hackers exploit indirect paths, similar to thieves using a spare key, to breach systems.
Our special guest during this episode is Matthijs Zwart from Vitens. Together with Lieuwe Jan and Luca they discuss the following hacks:
- SolarWinds: The danger of third-party software
- Log4j: The danger of software dependencies
- MOVEit: The danger of delegating data to third-party software
Interested in the full technical breakdown of the discussed threats?
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
Episode details
In this episode of Threat Talks, experts dive into the escalating risk of supply chain attacks amid growing reliance on third-party and open-source software. Featuring insights from Matthijs Zwart, CIO and CISO of Vitens, the discussion explores the implications of these threats in critical sectors like water supply.
The discussion extends beyond identifying the issue to emphasize proactive defense strategies. You’ll learn about the necessity of endpoint detection and response (EDR) software, implementing robust network firewall protocols, and consistently monitoring account sessions to detect and thwart unauthorized access.
Embark on this journey with us as we explore the balance between user convenience and the imperatives of stringent security measures. How do we navigate this precarious landscape to ensure the safety of our digital footprints? Tune in for an engaging exploration of these challenges and discover strategies to protect your digital identity in an ever-evolving cyber environment.
Subscribe to our Spotify channel and stay up to date with every cybersecurity treat.