Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

DoControl: Secure The SaaS Supply Chain

Truth in IT
07/04/2023
44
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


In this clip. DoControl covers the anatomy of SaaS supply chain attacks, covering five phases: infiltration, implantation, propagation, activation, and exploitation. Attackers gain access to the software supply chain through various techniques such as phishing, social engineering, or exploiting vulnerabilities. Once inside, they implant malicious code and spread it to other systems or applications to maximize the impact. The attackers then activate the code and exploit vulnerabilities to achieve their objectives, which could include data theft or disrupting system functionality.

SaaS supply chain risks focus on machine identity access and associated credentials, particularly in shadow applications that are unsanctioned by the IT department. These shadow apps may contain vulnerabilities or backdoors that can be exploited for unauthorized access to sensitive data. Compromising credentials and privileges involved in application-to-application interconnectivity is a proven technique used by attackers. Third-party apps often request more privileges than necessary, introducing additional accessibility vectors.

The webinar also highlighted notable breaches from the past year, including Samsung, GitHub, and Toyota. These breaches involved the compromise of credentials and OAuth tokens, allowing attackers to access sensitive data and exploit further infrastructure.

DoControl is a SaaS security platform focused on protecting business-critical SaaS applications. Their platform is built on three foundational tenets: discovery and visibility, monitoring and control, and automated remediation. DoControl aims to secure SaaS applications through automated security workflows, driving operational efficiency and enabling business productivity.
Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Identity & Access Management (IAM)
Channels:
News:
Events:
Tags:
  • docontrol
  • repost
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: DoControl: Secure The SaaS Supply Chain

              Upcoming Webinar Calendar

              • 12/02/2025
                01:00 PM
                12/02/2025
                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
                https://www.truthinit.com/index.php/channel/1629/the-invisible-threat-how-polymorphic-malware-is-outsmarting-your-email-security/
              • 12/02/2025
                01:00 PM
                12/02/2025
                Begin Your Journey with Netwrix
                https://www.truthinit.com/index.php/channel/1631/begin-your-journey-with-netwrix/
              • 12/04/2025
                12:00 PM
                12/04/2025
                Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation
                https://www.truthinit.com/index.php/channel/1557/insights-from-an-osc-and-c3pao-assessor-on-cmmc-level-2-evaluation/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-insights/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Maximize Revenue Opportunities with Druva’s Microsoft Expansion in APAC
                https://www.truthinit.com/index.php/channel/1624/maximize-revenue-opportunities-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Partner Tech Talk: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion
                https://www.truthinit.com/index.php/channel/1625/partner-tech-talk-bridge-gaps-and-enhance-revenue-with-druvas-microsoft-expansion/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Enhancing Revenue Capture through Druva’s Microsoft Partnership Insights.
                https://www.truthinit.com/index.php/channel/1623/enhancing-revenue-capture-through-druvas-microsoft-partnership-insights/
              • 12/16/2025
                01:00 PM
                12/16/2025
                HUMAN Dialogue: Discovering the Depths of Page-Level Performance Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-discovering-the-depths-of-page-level-performance-intelligence/
              • 12/18/2025
                11:00 AM
                12/18/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
              • 12/18/2025
                01:00 PM
                12/18/2025
                Insightful Perspectives on IconAds, SlopAds, and AI Threats in 2026
                https://www.truthinit.com/index.php/channel/1649/insightful-perspectives-on-iconads-slopads-and-ai-threats-in-2026/

              Upcoming Spotlight Events

              • Dec
                02

                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                12/02/202501:00 PM ET
                • Dec
                  10

                  The Next Generation of Managed Data Security Services

                  12/10/202501:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Dec
                    04

                    Insights from an OSC and C3PAO Assessor on CMMC Level 2 Evaluation

                    12/04/202512:00 PM ET
                    • Dec
                      09

                      Energize Your Connections with Netskope and Presidio Insights

                      12/09/202501:00 PM ET
                      • Dec
                        10

                        Maximize Revenue Opportunities with Druva’s Microsoft Expansion in APAC

                        12/10/202510:00 PM ET
                        More events

                        Upcoming 360 View Events

                        • Dec
                          18

                          360View: 2026 IT Predictions & Emerging Trends

                          12/18/202512:00 PM ET
                          More events

                          Recent Spotlight Events

                          • Nov
                            20

                            Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                            11/20/202501:00 PM ET
                            • Nov
                              18

                              Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                              11/18/202501:00 PM ET
                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                More events

                                Recent Industry Events

                                • Nov
                                  20

                                  CMMC Certification: Next Steps for Continuous Monitoring and Management

                                  11/20/202512:00 PM ET
                                  • Nov
                                    19

                                    Deep Packet Inspection (DPI) Insights within Endpoint Protector Learning Lab

                                    11/19/202511:00 AM ET
                                    • Nov
                                      18

                                      HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce

                                      11/18/202501:00 PM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version