Supply Chain Cybersecurity: How to Mitigate Third-Party Risks?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

With supply chain transparency and digital transformation being among the top organizational priorities, cyber-related issues have become one of the top risks to businesses.

Most companies don't consider their supply chain vulnerability when thinking about cybersecurity. Yet, supply chain risks could include multiple functions across the flow of information, products and services – needing the attention of all entities involved. Supply chain security is every company's responsibility.

In this webinar, we will address the key cybersecurity third-party concerns and discuss the most effective tactics for organizations to secure their supply chains and contribute to global supply chain security.

We will also discuss how certification to ISO 27001 can support supply chain security, the changes to ISO 27002 controls and how these controls relate to third-party cybersecurity.

We will explore:

  • Common issues and key principles in managing cyber-risk in your supply chain
  • The measures organizations can take to monitor, identify, assess and mitigate third-party risks
  • ISO 27002 changes and what these mean for ISO 27001 and your ISMS
  • What are the controls in ISO 27001 that relate to the supply chain and what do they mean for your business?

Speakers

Photo of Rob Acker

Rob Acker

ICT Technical Manager, LRQA

Photo of Benjamin David

Benjamin David

Deputy Editor, Infosecurity Magazine

Photo of Nick Prescot

Nick Prescot

Principal GRC Consultant (vCISO) at Nettitude

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for LRQA here: https://www.lrqa.com/en-gb/privacy-notice/. Please see Infosecurity Magazine’s privacy policy for more information.