Course details
Cyber threats, hackers, espionage and warfare are increasing the amount of successful attacks on critical infrastructure and companies of all sizes. We have technologies that are somewhat successful at blocking and stoping "some" attacks.
Amidst these threat vectors many people forget some of the most obvious targets like the supply chain and the security of data, information and IP as it leaves the outsourcing company (acquirer) to the supplier. An example of this type of attack is what happened to one of the biggest SIM manufacturers of the world Gemalto.
Supply chain risk management in its simplest form:
- Concentrates on identifying supply chain information security risks and the likelihood of those risks being exploited by missing governance, processes and misunderstandings between acquirer and supplier
- What types of risks are likely to a company or possibly a nation if supply chain risks and suppliers are not managed correctly
- Help you identify which risks you have based on the type of supplier and more importantly which assets you need to protect
- Choose mechanisms, processes and procedures that can mitigate and minimize some risks
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Personal Computer Fundamentals 1TRAININGUSD 21
USD 153Duration: Upto 8 Hours - USD 41
USD 98Duration: 1 To 2 Months - USD 2,967Duration: 12 Weeks Live virtual classroom