Identifying Concentration Risk and Securing the Supply Chain

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

With the upcoming Digital Operational Resilience Act (DORA) set to reshape risk management in financial services, understanding supply chain vulnerabilities is more crucial than ever.

During this webinar, Risk Ledger will provide valuable insights into how businesses can tackle concentration risk within their supply chain.

Built on analysis from our latest whitepaper, the session will guide you through practical steps to identify critical supplier dependencies, mitigate risks, and strengthen your supply chain's operational resilience.

Join us to learn how to proactively secure your operations against disruptions, align with regulatory expectations, and ensure compliance with DORA's stringent standards for third-party risk management.

Register now for this 30-minute webinar to learn: 

  • How to identify concentration risk in your supply chain, a critical component of DORA compliance
  • Strategies to diversify supplier dependencies for enhanced resilience
  • Best practices for building a secure, compliant supply chain in line with regulatory expectations

Speakers

Photo of Haydn  Brooks

Haydn Brooks

CEO & Co-Founder, Risk Ledger

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Risk Ledger here: https://riskledger.com/privacy. Please see Infosecurity Magazine’s privacy policy for more information.