"The New Normal" of Supply Chain Security

COVID-19 did more than just transform communications between employees and internal enterprise systems. For many enterprises, it also transformed interactions with customers and suppliers, adding new risks and cybersecurity challenges. In this webinar, experts discuss potential vulnerabilities in the new supply chain, and potential threats from online attackers. They also discuss the impact of these changes on compliance with industry and regulatory rules that govern the supply chain. You’ll learn how to protect your data from suppliers or customers whose systems or end users might be at risk. And you’ll get advice on how to protect your sensitive data from third-party vulnerabilities.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn about the new risks to supply chain in the wake of COVID-19
  • Get details on potential vulnerabilities in the new supply chain, and new potential threats from online attackers
  • Find out how this "new normal impacts compliance with industry and regulatory rules that govern the supply chain
  • Walk away with tips to protect your data from suppliers or customers with at-risk systems
  • Get advice on how to protect your sensitive data from third-party vulnerabilities

Featured Speakers

  • John Sawyer
    John Sawyer
    Associate Director of Services
    IOActive, Inc

    John H. Sawyer is the red team lead and specializes in targeted attacks, social engineering, and post-exploitation. After more than 15 years in IT security experience, he’s a member of DEF CON 14’s and 15’s CTF winners ([email protected]), co-founder the University of Florida Student Infosec Team, and founder of SwampSec. John is a respected author and trainer for organizations including Dark Reading and InformationWeek Magazine, Interop, BruCON, OWASP AppSec DC, SANS, and B-Sides Jacksonville.

  • Jon Ehret, CISSP, CISA, CRISC
    Jon Ehret, CISSP, CISA, CRISC
    Vice President of Strategy and Risk
    RiskRecon

    Jon Ehret is Vice President of Strategy and Risk for RiskRecon. Jon brings 20+ years of experience in technology and risk, including extensive experience building, maturing, and running third-party risk programs in both the finance and healthcare industries. Before joining RiskRecon, Jon built and lead the third-party risk program for BlueCross BlueShield of WNY and also served as President and Co-founder of the Third-Party Risk Association, an international professional association of third party risk practitioners and vendors. Jon is a frequent speaker at third-party risk conferences and holds a BS in Information Technology from the Rochester Institute of Technology, as well as the CISSP, CISA, and CRISC professional certifications.

  • Joan Goodchild
    Joan Goodchild
    Senior Editor
    Dark Reading

    Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online.

Sponsored By