Supply Chain Security - Industry Specific Insights

Presented by

Dan Vasile - Vice President of Strategic Development, BlueVoyant

About this talk

This session focussed on delivering deep insights into the current state of third party cyber risk across a multitude of industries, from media to auto and critical infrastructure. BlueVoyant conducted independent research across 1500 people located globally and working across a range of industries. 80% of those surveyed said they suffered a breach as a result of a third party while 98% said they do not monitor third party risk daily and 29% of them say they have no way to determine if a cyber risk emerged in a third party. Additionally 59% of companies surveyed in the study have anywhere from over 500 third parties up to 10,000. Managing distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners is quickly becoming the defining cyber security challenge in today’s increasingly interconnected business environment. Watch Dan Vasile, Vice President of Strategic Development at BlueVoyant, as he provides a perspective on what can be done to better protect organisations and their supply chains. Protect your data and defend against cybercriminals. Download your FREE ISF cyber security awareness month resource kit today - https://bit.ly/3r0kHPs

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (136)
Subscribers (21024)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user