Analyzing Vulnerabilities in Hardware and Software


Posted on in Presentations

How does an organization trace vulnerabilities in supply chains? What has been effective or not effective? Can professionals analyze vulnerabilities multiple tiers back or only the first tier? Join this session on risk management strategies to mitigate supply chain vulnerabilities in hardware and software.

This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.

Please note you are only able to Schedule/Reserve one Birds of a Feather session.

This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.

Participants
Amie Wozniak

Participant

Project Manager, Nth Degree

Cecilia Marinier

Participant

RSA Conference Program Manager, Self Employed

Robert Mayer

Facilitator, Participant

Senior Vice President - Cybersecurity, USTelecom

Zenab Zaman

Participant

Communications Analyst, National Risk Management Center, Cybersecurity and Infrastructure Security Agency (CISA)

Protecting Data & the Supply Chain Ecosystem

critical infrastructure risk management supply chain infrastructure security


Topic

Subtopic


Share With Your Community