Analyzing Vulnerabilities in Hardware and Software


Posted on in Presentations

How does an organization trace vulnerabilities in supply chains? What has been effective or not effective? Can professionals analyze vulnerabilities multiple tiers back or only the first tier? Join this session on risk management strategies to mitigate supply chain vulnerabilities in hardware and software.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.

Please note you are only able to Schedule/Reserve one Birds of a Feather session.

This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Participants
Robert Mayer

Facilitator

Senior Vice President - Cybersecurity, USTelecom

Protecting Data & the Supply Chain Ecosystem

critical infrastructure risk management supply chain infrastructure security


Topic

Subtopic


Share With Your Community