
Owners of critical infrastructure face a growing challenge: how to regain visibility and control over the software and hardware components that are supplied by third parties.
From cloud providers and software vendors to hardware suppliers, every dependency introduces new layers of risk. Recent incidents have shown how vulnerabilities hidden deep within supply chains can have global consequences.
Join Dr. Joye Purser and panelist in a lively discussion that includes strategies. Organizations across the globe are employing to reduce this risk. This exclusive virtual roundtable will bring together senior security and risk leaders to discuss strategies, challenges, and best practices for mitigating third-party risk. Together, we will explore how organizations across industries are strengthening resilience against the vulnerabilities embedded in complex supplier ecosystems.