The term ‘supply chain’ implies a straightforward linear process. But the reality of the Department of Defense (DoD) network is a tangled web of connected companies, big and small. And currently, the biggest attack targets are those smaller businesses, who have the leanest budgets. We will discuss:
· Why cyber attack strategies have recently shifted to smaller companies
· How to improve security in companies with smaller budgets
· What actions SMB's in the Defense Industrial Base can take, in the short and longer term
How can you ensure that remote working doesn’t compromise your data control? By using the latest thinking from Microsoft, BlueVoyant is helping customers simplify compliance and reduce risk. Join Micah Heaton, Robert Hannigan and Owen Allen in the latest Microsoft webinar series. We take a closer look at what information protection means, the need for data governance and how Microsoft’s approach to information protection means it’s possible to minimise risk without affecting productivity.
The webinar will give insights into best practice when building a data strategy and how Microsoft tools can help in areas such as:
- keeping up with industry regulations and standards
- identifying and mitigating insider risks
- scaling data protection with automation
- cost saving
We will also cover record management, data classification and how Microsoft can extend the protective solution beyond the cloud perimeter.
Amy Williams, Tom Conway - Director, Federal Business Development, Thomas Lind - Strategic Intelligence
CMMC regulation was born from recognition that the defense industrial base’s cyber security attack surface isn’t siloed, it’s connected. Subcontractor networks and their employees, third-party applications and anything else that touches a prime contractor’s systems present cyber risk, leaving sensitive data as vulnerable as the weakest link in the prime’s ecosystem.
This webinar will cover why subcontractors are usually the first point of attack in the supply chain, common ways they are attacked and the value of assessment. Most importantly, we will provide guidance on how prime contractors can lead improvements in supply chain protection through continuous monitoring.
Level 3 is the most commonly requested compliance level and is the most like prior regulations. We will offer some tips and tricks for getting organized quickly and being best prepared for the assessors.
BlueVoyant's Robert Hannigan (Chairman), Wayne Chung (CTO) & Brandon Beaty (CAO)
Join our BlueVoyant experts as they discuss what happened in the SolarWinds breach back in February 2021
Wayne Chung (Chief Technology Officer) Robert Hannigan (Chairman of BlueVoyant International) Brandon Beaty (Chief Analytics Officer US • Threat Intelligence & Operations) and hosted by Ewen O'Brien (Senior Vice President - Europe)
Phil Venables, Goldman Sachs Bank; Debora Plunkett, Board Director, BlueVoyant; Jim Penrose, COO, BlueVoyant;
Third-party cyber risk is fast becoming the defining cybersecurity challenge of our time.
That’s why we’ve surveyed 1500 CIOs, CISOs and CPOs to understand the scale and scope of third-party cyber risk, the impact it is having, and the way cyber risk professionals are approaching and mitigating the issue.
80% revealed they have suffered a third-party related breach
29% admitted they wouldn’t know if a cyber risk emerged in a third-party vendor
77% do not monitor their entire supply chain
Our panel will discuss the research and reveal ways your organization can gain more control over your cyber risk management program.
BlueVoyant is an expert-driven cyber security services company whose mission is to proactively defend organizations of all sizes against the constant threat of sophisticated attackers and advanced threats in today’s highly interconnected world.
What we do: We deliver purpose-built cyber security services that proactively defend business ecosystems of all sizes against today’s threats by utilizing large, real-time datasets with industry leading analytics, and technologies. Our threat intelligence data detects your most potent cybersecurity risks, while intuitive automations mitigate threats against your attack surface effectively and efficiently, providing the business and technical outcomes you need to both stay secure and to support your business objectives.
Modern SOC & the optimization of Microsoft SecurityMilan Patel (Head of Managed Security Services) & Micah Heaton (Director of Microsoft Security Solutions)[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]60 mins