Talk With an Expert

CIMTK: Third-Party/Supply Chain Incident Management Plan

CIMTK: Third-Party/Supply Chain Incident Management Plan (PDF, 0.74MB)Published: 21 Sep, 2023
Created by:
Steve Armstrong-Godwin
Steve Armstrong-Godwin

Supply Chain Attacks (also called 3rd Party Attacks) are becoming more common as the numbers of outsourced services increases and attackers see these as ways to circumvent your primary security barriers. When one of your suppliers are compromised you need to kick off several key urgent risk related tasks that we have summarized on this cheat sheet. Your immediate objective is to understand your exposure to them and any attacker leveraging their access and permissions into your network or cloud data. This sheet is used in the 4-lab deep dive on Supply Chain attacks, in LDR553: Cyber Incident Management, were we assess, investigate, plan, and document our response and risks. Even if you can’t make the course, you can still benefit from the structured high-level Incident Management Plan.

Author

Steve Armstrong-Godwin
Steve Armstrong-Godwin

Steve Armstrong-Godwin

Principal Instructor

Steve brings 25+ years of cybersecurity experience, including 14+ years in incident response and management. After serving in the UK Royal Air Force, where he led penetration testing teams, he gained expertise in managing cyber incidents globally.

Read more about Steve Armstrong-Godwin