Posted on
in Presentations
How does an organization trace vulnerabilities in supply chains? What has been effective or not effective? Can professionals analyze vulnerabilities multiple tiers back or only the first tier? Join this session on risk management strategies to mitigate supply chain vulnerabilities in hardware and software.
This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.
Please note you are only able to Schedule/Reserve one Birds of a Feather session.
This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community