Subsidiaries, suppliers and third- or fourth-party vendors from all business relationships are increasingly being targeted as initial compromise vectors. Traditional approaches to subsidiary and supply chain monitoring involve paper-based assessments and scoring, which often require manual analysis.
Join Megan DeBlois, Principal Product Manager and Tim Gallo, Strategic Intelligence Architect, as they discuss how to assess and manage the attack surface introduced by supply chain business relationships and extended portfolios. Megan and Tim share risk mitigation insights that can be applied at any organization:
• Application of federal-state monitoring models for subsidiary attack surface management
• Automated and continuous risk assessments to improve response times
• Intelligence-led prioritization and response plans