Tuesday, February 23 | 11 AM – 12 PM EST

Last year foreign hackers secretly broke into a US-based IT security solution provider and added infected code into their software. As part of the company’s regular software update process, the company unknowingly forwarded malicious code, creating a backdoor to their clients’ IT systems. Multiple government agencies and private organizations were impacted.

The breach caught many of the Federal government’s IT security watchdogs completely off guard. The countless contractors, vendors, and suppliers needed to fulfill the mission of the Federal government has resulted in a vast and complex supply chain, with limited visibility into, and control over, operational risk. While technological transformation has increased the sophistication of weaponry, communications, and operations, it has also exponentially multiplied vulnerabilities and threatens to undermine mission effectiveness. America’s defense is only as secure as its weakest link in the supply chain.

Presenters:

John Cofrancesco | Vice President

John has spent his career protecting the data holdings of military, federal, and commercial clients. John specializes in identifying weaknesses in records management architectures and developing commercial solutions to secure those gaps. His experience has positioned him to spot the fragility in complex data systems and see the universe of possible commercial solutions, leveraging his experience working within the military and federal communities.

WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 3
Utilities
WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 4
Transportation
WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 5
Healthcare
WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 6
Finance
WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 7
Energy
WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 8
Additional Industries
WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 9

WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 10 WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 11 WEBINAR - America Under Cyber Attack: Operating in a Post-Sunburst World 12

189 S. Orange Avenue, Ste 1950, Orlando, FL 32801
(407) 573.6800
sales@fortressinfosec.com

COPYRIGHT © 2020. FORTRESS INFORMATION SECURITY. ALL RIGHTS RESERVED. PRIVACY POLICY

DOWNLOAD THE FULL

THREAT INTELLIGENCE REPORT

ORACLE LINUX 7 REPOSITORIES INFECTED WITH “HTML.EXPLOIT.C99-24” EXPLOIT

DOWNLOAD THE FULL

THREAT INTELLIGENCE REPORT

ZOOM VIDEO CONFERENCING AND COMMUNICATIONS

THREAT INTELLIGENCE REPORT

Windows CryptoAPI Vulnerability

White Paper

Asset to Vendor Network for Power Utilities

PRESS RELEASE

FORTRESS LAUNCHES INNOVATIVE COLLABORATION TO HELP PROTECT THE POWER GRID FROM CYBER THREATS

Emerging Risk Brief

ASSET RISK MANAGEMENT - FOR PORT AUTHORITIES

Advisory

5 STEPS FOR AN EFFECTIVE THIRD PARTY VENDOR RISK PROGRAM

White Paper

CIP COMPLIANCE – UPDATES, ENFORCEMENT AND PRACTICAL IMPLEMENTATION

Advisory

5 STEPS TO A STRONG VULNERABILITY MANAGEMENT PROGRAM

WHITE PAPER

NERC CIP COMPLIANCE

Subscribe to Fortress Newsletter

For breach reports, threat intelligence, regulatory updates, cyber security news alerts and more, sign up to receive the Fortress Newsletter.

No, thanks!

Threat Advisory

Outdated Security Appliance Facilitates Denial-of-Service Attack on U.S. Grid

WEBINAR DOCUMENT

NERC CIP SUPPLY CHAIN SECURITY STANDARDS