Latest News: Binary Defense Named a Strong Performer by Leading Independent Research Firm

Access Report

Search

Unveiling the Complexities: Defender Insights on Supply Chain Compromises in Cyberspace

ON-DEMAND WEBINAR

ThreatTalk Series

Supply chain cyberattacks have surged in both frequency and sophistication throughout 2024 and into 2025. Threat actors, including state-sponsored espionage groups and profit-driven cybercriminals, are increasingly exploiting trusted relationships between organizations and their suppliers, software vendors, cloud providers, and contractors. In this edition of our ThreatTalk series, our experts will cover the surge of supply chain compromises impacting a wide range of industries.  

Our experts will highlight critical areas of vulnerability, covering attacks on software and cloud systems, cryptocurrency platforms and wallets, as well as other attack vectors such as hardware and firmware tampering, third-party exploitation, supplier-driven ransomware, and insider risks. Join us for an insightful session with our threat intelligence team as they explore real-world incidents and share actionable strategies to strengthen security measures when working with third-party suppliers. 

Our Threat Intelligence and Research team will be covering: 

  • The Escalating Risk of Supply Chain Attacks 
  • Infiltration of Cloud Services and Managed Service Providers 
  • Espionage and Sabotage by Nation-State Threat Actors  
  • Real-World Case Studies: Exploiting Supplier Access  
  • Hardware and Firmware Tampering  
  • Insider Threats and Third-Party Access Exploitation  
  • Effective Strategies to Prevent Supply Chain Attacks  
  • Interactive Live Q&A Session 

What is a ThreatTalk?

Powered by ARC Labs, ThreatTalk is a webinar series crafted to drive engagement and provide timely and relevant intelligence on the state of the threat landscape. Led by our seasoned experts, each session dives into our latest threat intelligence trends and effective threat-hunting strategies. 

About The Speakers

JP Castellanos

JP Castellanos, the Director of Threat Intelligence at Binary Defense, brings over 15 years of extensive experience in the cybersecurity domain. Beginning his career as a help desk analyst in the Department of Defense (DoD), JP has skillfully climbed the ranks through roles in Incident Response (IR), Security Operations Center (SOC) management, Threat Hunting, and Cyber Threat Intelligence. His tenure with the DoD lasted till 2018, after which he served as a Senior Threat Intelligence Analyst supporting a major oil and gas organization until 2023.

An expert in advanced threat detection and response, JP holds several prestigious certifications from SANS, including FOR578 Cyber Threat Intelligence Analyst, FOR572 Network Forensic Analyst, and SEC599 Defending Advanced Threats. These credentials underscore his expertise in anticipating, mitigating, and defending against advanced cyber threats.

Known for his ability to translate complex threat landscapes into actionable intelligence, JP is committed to fortifying organizations against the evolving challenges of cybersecurity. His unique blend of technical expertise and strategic foresight ensures that attendees gain valuable insights into the detection and prevention of sophisticated cyber threats.

 

 

Trevor Checho

Trevor discovered his passion for cybersecurity at a young age and has been an active contributor to the cybersecurity community since 2012. He graduated from Penn State in 2020 with a degree in Security and Risk Analysis and holds an eCTHPv2 certification. Trevor began his career as a SOC Analyst at ReliaQuest, where his dedication and expertise quickly earned him a promotion to Senior Analyst. His commitment to protecting clients from threat actors consistently shone through in the excellence of his work, allowing him to refine his skills and perfect his craft.

Trevor later joined Binary Defense as a Threat Researcher, where he applies years of hands-on experience to enhance threat detection and mitigate threats to clients. By conducting hypothesis-driven threat hunts, he identifies hidden vulnerabilities and combats advanced, elusive threats. His expertise in identifying threats and leveraging his findings to strengthen clients’ security defenses highlights his exceptional skill and commitment to protecting organizations. This dedication makes him an invaluable asset in outsmarting malicious actors.