supply chain security
Security in A World of “WE” – Embracing Our Third Party Ecosystems
Edna Conway, Cisco CSO Global Value Chain will discuss supply chain security challenges and tested, practical methods to addressing those challenges at NATO NIAS’19 in Mons, Belgium in October https://nias19.com
Collaboration Is Key to Driving Cyber Supply Chain Risk Management Worldwide
In our increasingly digital world, technological innovation not only presents new opportunities, but also raises new risks and challenges that must be addressed by industry, buyers, users, and policymakers. The...
Tackling the Growing Threat Landscape of ICS and the IIoT
It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise.
Value Chain Security: The Ultimate Team Sport
Cisco appreciates the importance of our third party ecosystem partners as they participate in the various stages of the lifecycle of our solutions—whether services, software or hardware.
Attacking the Weakest Link in the Supply Chain
What Just Happened?! Millions invested in the latest security technologies? Check. Your team trained on information security best practices? Check. Passed a third-party review of your security architecture? Check. So, how the hell were hundreds of your servers’ hard drives just destroyed by malware within minutes?! That’s exactly what your CEO, your Board and your […]
Connections: Vulnerabilities? Or Advantages?
When is the last time that you didn’t update the operating system on your phone? Or ignored those pop-up messages letting you know your software is out of date? Last week I was in Arizona with about 50 partner executives, a speaker from Talos asked us the same question. A small number of people raised their hand. […]
Connected Value Chains: The Pervasive Security Imperative
We can no longer debate the reality of digital disruption and its impact on each of us in all we do, at work, at home and at play. Today’s challenge is to embrace the connected world and address security on a comprehensive continuum to ensure its optimum impact. To do this, we must look at […]