Strategies For Securing Your Supply Chain

Recent attacks like the zero-day Log4j vulnerability have brought new scrutiny to cyber threats from suppliers and enterprise trading partners. But what does an effective supply-chain security strategy look like? How can you ensure that customers, suppliers, contractors, and others in your supply chain are doing what they should to protect their systems – and their connections to your enterprise? In this webinar, experts discuss strategies and technologies you can use to assess the security capabilities of your trading partners, and to ensure that future attacks on application providers won’t damage your organization’s data – or inadvertently cascade on to external third-parties.

On Demand
1h 00min

Attend this webinar and you'll:

  • Be better equipped to assess the overall security posture and defense readiness of your networks -- and those of your partners.
  • Improve quality and content of communications and coordination with partners and other third-parties essential to your operations.
  • Learn how to anticipate and react to the inevitable zero-day threats in the pipeline.
  • Bolster overall supply-chain security and improve reliability and resilience.

Featured Speakers

  • John Pironti
    John Pironti
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Adam Mansour
    Adam Mansour
    Chief Security Officer

    A thought-leader in Cyber technology, Adam Mansour has the depth of knowledge of an industry veteran, with experience in the Cybersecurity sector since 2005. As Chief Security Officer of ActZero, Adam is driving the company's Virtual Chief Information Security Officer (VCISO) and technology integration programs, and its evolution as the industry’s leading Managed Detection and Response (MDR) service provider. Adam’s experience is both broad and deep within the sector, and spans endpoint, network and cloud systems security; audits and architecture; building and managing SOCs; software development and resellership alike; healthcare, education, defense and financial organizations; global enterprises of all sizes. Most recently, he served as VCISO helping customers through new privacy regulations GDPR, CCPA and Bill C-11 and guidance on how to prevent complex malware such as SolarGate and RaaS. Prior to ActZero, Adam was the Founder and CTO of IntelliGO Networks (acquired by ActZero) and he developed its proprietary MDR software, built to service the threat hunting process. He also had key roles in managed security services for SIEM, NGFW and Penetration Testing performed by the company. Adam holds a BASc in Computer Science as well as multiple industry certifications and awards for ethical hacking and various cyber technologies.

  • Terry Sweeney
    Terry Sweeney
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World,, and Stadium Tech Report.

Sponsored By