̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Multi-Vendor

The Invisible Invasion: How Supply Chain Attacks Slip Past Defenses


Event Date: April 27, 2026
Hosted By: Black Kite, Guidepoint, The Chertoff Group & ̽»¨ÊÓÆµ

Today’s most dangerous cyberattacks don’t break through your defenses — they quietly slip past them.

Join us for this upcoming live panel discussion, where cybersecurity experts unpack how attackers are increasingly exploiting trusted vendors, third-party software and hidden dependencies to gain access without detection.

This event will feature insider perspectives from former supply chain and ransomware experts of the SSA, NSA and FBI, while exploring how modern supply chain threats operate, why traditional security tools fail to catch them and where organizations unknowingly expose themselves to risk.

During this session, attendees will walk away with:

  • A clear understanding of today’s evolving supply-chained focused ransomware
  • Insight into how attackers leverage “inherited trust” to bypass defenses
  • A step-by-step view of how a supply chain attack unfolds in real time
  • The hidden risks lurking beyond your immediate vendor ecosystem
  • Practical strategies to shift from trust-based to intelligence-driven security

As supply chain attacks grow more sophisticated and impactful, organizations must rethink how they identify, monitor and respond to third-party risk. This panel discussion will equip you with the knowledge to move beyond reactive defenses and gain the visibility needed to stop threats before they spread.

Reserve your spot and take the first step toward uncovering the risks others miss.


Resources


AWS-Color-Smile-Logo-Cropped_80.png
Video

Best Practices for Building Data Lakes on AWS

In this session, attendees discovered how AWS gives you fast access to flexible and low-cost IT resources so you can rapidly scale and build your data lake.


Fill out the form below to view this Resource.