What Lurks within Your IT: Spotlight on the Dark Side of the Supply Chain


Posted on in Presentations

Altered components, tainted software and shipments diverted to allow unauthorized “modifications” are alive and well in ICT. IT/OT experts on this third-party risk will explore the breadth of the risk and what can be done to address it. They will explore policy, operations and technology essential to secure the growing number of devices on which private enterprises, governments and citizens rely.

Learning Objectives:
1: Understand the complexity of the risk environment for ICT.
2: Gain awareness of the risk of unauthorized modification to ICT-via components, tainted software and more.
3: Gain tangible, feasible and effective techniques to tackle the insidious threat posed tainted parts.

Participants
Dawn Cappelli

Participant

Director, OT-CERT, Dragos

Edna Conway

Participant

CEO| Board Director | Sr. Nonresident Fellow , EMC ADVISORS | Active Cypher, Attabotics, Critical Start, Cyber Re | Carnegie Endowment for International Peace


Share With Your Community