Remote work Infographic<br />

Listen to The Threat Talks on:

Supply Chain: Business as usual?

Your cybersecurity experts

Lieuwe Jan Koning

Co-Founder and CTO ON2IT

Luca Cipriano

Threat Intel Specialist ON2IT

Rob Maas Field CTO

Matthijs Zwart

CIO and CISO Vitens 

Remote work Infographic

Supply chain: Business as usual? 

As reliance on third-party and open-source software grows, so does the risk of supply chain attacks, where hackers exploit indirect paths, similar to thieves using a spare key, to breach systems.

Our special guest during this episode is Matthijs Zwart from Vitens. Together with Lieuwe Jan and Luca they discuss the following hacks:

  • SolarWinds: The danger of third-party software
  • Log4j: The danger of software dependencies
  • MOVEit: The danger of delegating data to third-party software

Interested in the full technical breakdown of the discussed threats?

Download the infographic for the complete overview

Join the treasure hunt and order your own hacker T-shirt for free. 

Find the code within this episode and send it in. 

9 + 12 =

Episode details:

In this episode of Threat Talks, experts dive into the escalating risk of supply chain attacks amid growing reliance on third-party and open-source software. Featuring insights from Matthijs Zwart, CIO and CISO of Vitens, the discussion explores the implications of these threats in critical sectors like water supply.

The discussion extends beyond identifying the issue to emphasize proactive defense strategies. You’ll learn about the necessity of endpoint detection and response (EDR) software, implementing robust network firewall protocols, and consistently monitoring account sessions to detect and thwart unauthorized access.

Embark on this journey with us as we explore the balance between user convenience and the imperatives of stringent security measures. How do we navigate this precarious landscape to ensure the safety of our digital footprints? Tune in for an engaging exploration of these challenges and discover strategies to protect your digital identity in an ever-evolving cyber environment.

Subscribe to our Spotify channel and stay up to date with every cybersecurity treat.