Risky Business: Understanding Enterpris...
Discovering, prioritizing, and monitoring cybersecurity risks across an ecosystem of third-party products is a complex undertaking for any business, let alone a large enterprise. Join us for an in-depth discussion exploring best practices, lessons learned, and the regulatory environment associated with third-party risk management. Speakers will provide insight and tips into overcoming the challenges of defining and implementing a holistic risk...
March 28, 2023
Organizer:
Fortress Location:
Webcast
Implementing the New NIST Guidelines fo...
As supply chain complexity continues to grow, so does the need for illumination and regulatory standards. Federal contractors need to be aware of the updated NIST guideline requirements and best practices for implementation.
America Under Cyber Attack: Operating i...
How to Prevent & Manage Supply Chain Risks Last year foreign hackers secretly broke into a US-based IT security solution provider and added infected code into their software. As part of the company’s regular software update process, the company unknowingly forwarded malicious code, creating a backdoor to their clients' IT systems. Multiple government agencies and private organizations were impacted. The breach caught many of the Fede...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.