Combatting Cyber Risks in the Supply Chain

  • Webcast Aired Thursday, September 10, 2015 at 1:00 pm EDT (2015-09-10 17:00:00 UTC)
  • Speakers: Dave Shackleford, Joshua Douglas

Along with unprecedented advancements in the sophistication of attackers comes an acceleration of the pace of data breaches and intrusions into computer systems. At the same time, advances in technology have created greater efficiency and effectiveness for organizations and their supply chains. However, in the past several years, there have been a number of high-profile breaches that have implicated the supply chain. Because of the damage such breaches can cause, it is vital that all organizations consider ways to enhance their supply chain security practices.

One key to supply chain security is developing a vendor management program, which provides insight into vendor practices and enables appropriate communication to avoid or mitigate breaches. This webcast provides guidance on building an effective vendor management program and describes the best practices to secure the people and processes in your supply chain.

Attendees will learn about implementing the following technology controls to ensure secure supplier interactions:

  • Privilege management
  • Network isolation and segmentation
  • Analytics and threat intelligence
  • Exfiltration monitoring

Be among the first to receive the associated whitepaper written by Dave Shackleford.

View the associated whitepaper here.