Prioritizing Risk to Reduce Supply Chain Vulnerabilities

Presented by

Jason Cook, Cyber Defense Labs | Mike Spotts, Cyber Defense Labs | Jon Garside, Securonix

About this talk

The recent SolarWinds attack was an unpleasant reminder of our interconnected enterprises. Businesses across every economic sector can encounter vulnerabilities not only from within their own environment but also from critical supply chain partners and other third-party dependencies. Prioritizing risk based on the business impact can help ensure business strategies and operations remain on track and protected. Join Cyber Defense Labs President and COO, Jason Cook, Mike Spotts, Cyber Defense Labs Vice President and CTO, and Jon Garside, Director Partner Marketing at Securonix and learn how to: · Assess your environment to determine what matters most and where to start · Establish a roadmap with clear priorities to effectively manage vulnerability and create a more resilient business environment · Identify your most valuable business operations to ensure proper security controls and processes are in place to prevent future loss or harm · Invest to ensure you maintain high security and risk management standards despite limited resources Jason Cook is a seasoned cybersecurity executive with a track record of helping organizations not only protect their current business but create resilience to manage and deter any future threats. As a trusted partner in cybersecurity business practices, he serves on several companies' advisory boards and is a frequent expert speaker on technology and security issues. Michael Spotts has an extensive operational background in designing, implementing, and running global cyber operations and services for Fortune 100 companies. As the CTO of Cyber Defense Labs, he now oversees their Security Operations Center, monitoring client's network around the clock.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (62)
Subscribers (11805)
Securonix Next-Gen SIEM delivers unlimited scalability, ML-based analytics, threat modeling with MITRE ATT&CK, and automated incident response. Follow this channel to learn how our SaaS-based, end-to-end security operations platform sets the standard for advanced threat detection and response. Our security experts will discuss threat trends, detection techniques, and SecOps topics such as cloud security, insider threat, NTA, SIEM, UEBA, XDR, and SOAR.