Webinar

Compromised Components: The Threat Already Inside Your Network

Available on demand until November 4, 2025 REGISTER

In 2023, a Fortress Information Security review of more than 200 software products commonly used by utilities showed that 90 percent contained component contributions from Russian and Chinese developers. Software with Russian or Chinese-made code examined by Fortress research is 2.25 times more likely to have vulnerabilities and three times more likely to have critical vulnerabilities. Fortress’s findings made headlines – getting covered by POWER as well as CNBC and The Wall Street Journal.

Now, Fortress is preparing a follow-up report looking at a much larger pool of software. The researchers want to know:
● what are the Common Vulnerabilities and Exposures in critical infrastructure
● what’s actually exploitable to remove noise and identify what to prioritize
● what can you do about it when patching isn’t an option

Webinar participants will get an in-depth look at the newest research and learn how to attack the threats already lurking inside their systems.