Jessica Entwistle
January 30 2026
In 2026, the most successful cyberattacks aren’t aimed directly at you - they come in through the back door. That back door is often your SaaS, cloud, or IT suppliers.
From compromised software updates to impersonation attacks against your MSP, supply chain compromise has become the most common breach path for UK businesses. Yet most organisations are still underestimating just how much access their suppliers have - or how little control they really hold.
This session will help you get a clear handle on third-party risk in your organisation. We’ll explain how attackers use suppliers as stepping stones, what controls actually make a difference, and how to reduce exposure without adding unnecessary admin overhead.
Whether you rely on external IT support, SaaS tools, or cloud-based services - this webinar will help you ask the right questions and take back control of your extended attack surface.
Business owners, IT and security leaders, operations managers, or anyone responsible for choosing, managing, or securing supplier access.
This session is jargon-free, action-focused, and designed to help you reduce supplier risk without slowing down your business.
📅 Date: Tuesday 11th February 2026
🕒 Time: 2pm–2:45am (UK time)
📍 Location: Online