Prioritizing Risk to Reduce Supply Chain Vulnerabilities
Jason Cook, Cyber Defense Labs | Mike Spotts, Cyber Defense Labs | Jon Garside, Securonix
About this talk
The recent SolarWinds attack was an unpleasant reminder of our interconnected enterprises. Businesses across every economic sector can encounter vulnerabilities not only from within their own environment but also from critical supply chain partners and other third-party dependencies. Prioritizing risk based on the business impact can help ensure business strategies and operations remain on track and protected.
Join Cyber Defense Labs President and COO, Jason Cook, Mike Spotts, Cyber Defense Labs Vice President and CTO, and Jon Garside, Director Partner Marketing at Securonix and learn how to:
· Assess your environment to determine what matters most and where to start
· Establish a roadmap with clear priorities to effectively manage vulnerability and create a more resilient business environment
· Identify your most valuable business operations to ensure proper security controls and processes are in place to prevent future loss or harm
· Invest to ensure you maintain high security and risk management standards despite limited resources
Jason Cook is a seasoned cybersecurity executive with a track record of helping organizations not only protect their current business but create resilience to manage and deter any future threats. As a trusted partner in cybersecurity business practices, he serves on several companies' advisory boards and is a frequent expert speaker on technology and security issues.
Michael Spotts has an extensive operational background in designing, implementing, and running global cyber operations and services for Fortune 100 companies. As the CTO of Cyber Defense Labs, he now oversees their Security Operations Center, monitoring client's network around the clock.
Securonix Next-Gen SIEM and XDR deliver threat detection and response powered by flexible, cloud-native advanced analytics.
Follow this channel to learn from our security experts. They will discuss threat trends, detection techniques, and SecOps topics such as cloud security, insider threat, NTA, SIEM, UEBA, XDR, and SOAR.…