Posted on
in Presentations
Within the all-round digital transformation, every company relies on a multitude of third-party vendors, adding to difficult-to-manage third-party risk. Their services contain code that always has vulnerabilities, which puts their users, industries, societies, and countries at risk. Will there be a global policy response? Is fixing common cybersecurity vulnerability even possible at all?
Participants
Jon Fanzun
Panelist
Special Envoy for Cyber Foreign and Security Policy, Federal Department of Foreign Affairs (FDFA), Switzerland
Policy & Government Protecting Data & the Supply Chain Ecosystem Technology Infrastructure & Operations
critical infrastructure government regulations policy management supply chain
Topic
Policy & Government
Protecting Data & the Supply Chain Ecosystem
Technology Infrastructure & Operations
Subtopic
critical infrastructure
government regulations
policy management
supply chain
Share With Your Community