Course Information
- Available
- *The delivery and distribution of the certificate are subject to the policies and arrangements of the course provider.
Course Overview
Understanding Supply-Chain Information Security Risk Management
In today's Supply Chain, cyber threats, hackers, espionage, and warfare are increasing the amount of successful attacks on critical infrastructure and companies of all sizes. We have technologies that are somewhat successful at blocking and stopping "some" attacks. But what happens when we need supply chain security or risk management? The things we wear, eat, and need would no longer exist. Risk Management is not the sexier of areas in security, but since it is so invisible, it is just as important as secure coding or SOC.
Amidst these threat vectors, many people forget some of the most prominent targets, like the supply chain and the security of data, information, and IP, as it leaves the outsourcing company (acquirer) to the supplier. An example of this type of attack is what happened to one of the biggest SIM manufacturers in the world, Gemalto.
Supply chain risk management in its simplest form:
Concentrates on identifying supply chain information security risks and the likelihood of those risks being exploited by missing governance, processes, and misunderstandings between acquirer and supplier
What types of risks are likely to a company or possibly a nation if supply chain risks and suppliers are not managed correctly
Help you identify which risks you have based on the type of supplier and, more importantly, which assets you need to protect
Choose mechanisms, processes, and procedures that can mitigate and minimize some risks
Course Content
- 3 section(s)
- 17 lecture(s)
- Section 1 Introduction to Supply-Chain Risk Managment
- Section 2 Exam
- Section 3 Course Materials
What You’ll Learn
- Understand Supply-Chain
- Understand ICT Supply-Chain Risks
- Understand how to address Information Security risks
- Understand what ISO/IEC27036 is and how it links to the 2700X family
Skills covered in this course
Reviews
-
MMarc Hawsey
I like the delivery of the material.
-
SSwapna Elsa Oommen
VERY INFORMATIVE
-
KKirk Christensn
Very good info ... however, in module 1: Intro to the Course - either I misunderstood or Michael G. incorrectly noted the labeling of secured documents was a part of CMMC program and training, etc. This is incorrect - as CMMC only deals with FCI / CUI ... and specifically does not address any secured information. If I misunderstood Michael's comments - my apologies. Otherwise, the material was very good.
-
VVictoria Cohen
Clear, concise, easy to understand