
Supply Chain: Reducing the cyber risks from blind spots in your vendor ecosystem
98% of organisations have a hacked vendor. Join this session to discover how to protect your organisation from third-party risks.
Topic
Legislation, standards, regulationsGovernance, Riskmanagement and ComplianceSIEM / Threat Analytics / SOC
When & Where
Details
Format:
Technology lecture
Session description
Recent research revealed that 94% of Germany’s top 100 companies had a breach in their third-party ecosystem in the last 12 months.
To mitigate these threats, this session will explore best practices to optimise your supply chain risk management program. You will discover how to:
- Get full visibility of your attack surface
- Evolve from point-in-time vendor questionnaires to continous monitoring of your third parties
- Uncover supply chain threats before they impact your organisation
- Improve efficiency and automate workflows
- Accelerate compliance with regulatory frameworks (including NIS2, DORA)
To mitigate these threats, this session will explore best practices to optimise your supply chain risk management program. You will discover how to:
- Get full visibility of your attack surface
- Evolve from point-in-time vendor questionnaires to continous monitoring of your third parties
- Uncover supply chain threats before they impact your organisation
- Improve efficiency and automate workflows
- Accelerate compliance with regulatory frameworks (including NIS2, DORA)
Speaker
Moderator
