Safeguarding Critical Supply Chain Data Through Effective Risk Assessment

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Critical data is proliferating outside of organisational visibility and control, driven by technological innovations like cloud transformation, SaaS and AI. This creates a complex landscape where traditional security measures are no longer sufficient.

Organisations must rethink their approach to data protection and adopt a more collaborative and proactive strategy.

To address this challenge, key controls like third-party risk management, data governance and continuous monitoring are essential. By implementing these controls and adopting a connected risk strategy, organisations can manage emerging risks and ensure data integrity.

Through this expert-led discussion, participants will gain valuable perspectives and practical guidance to inform their approach to managing critical supply chain data. 

Join us to learn how to: 

  • Implement a robust third-party risk management program to mitigate supplier and vendor risks
  • Develop a comprehensive data governance framework to manage data across the supply chain
  • Establish access controls and continuous monitoring to protect against unauthorized access and cyber threats

Speakers

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for AuditBoard here: https://www.auditboard.com/privacy-notice/. Please see Infosecurity Magazine’s privacy policy for more information.