Countering Supply Chain Attacks: Where next?

Presented by

Benoit Heynderickx - Principal Analyst, ISF, and Elli Tsiala - Product Owner, Third Party Security Risk Management, ABN AMRO

About this talk

Supply chain attacks are high on the agenda of the board, but there are no easy fixes to a growing challenge. How do you secure your organisation against cyber threats that take advantage of large, complex and fast-changing supply chains? Join Benoit Heynderickx, Principal at the ISF, in conversation with Elli Tsiala, Product Manager at ABN AMRO, as they discuss and explore how to: - communicate the threat of supply chain attacks - categorise and prioritise suppliers according to threats and impacts to the business - implement best practices throughout the full supplier management lifecycle. Elli is a seasoned information security professional with more than 10 years of experience in the sector, specialising in Third Party Security Risk Management (TPSRM). She has developed and led multiple TPSRM programmes for multinational companies across sectors, and is currently working as the Product Owner for TPSRM in ABN AMRO bank, with a global mandate. Protect your data and defend against cybercriminals. Download your FREE ISF Cyber Security Awareness Month resource kit today - https://bit.ly/3r0kHPs

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (137)
Subscribers (21066)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user