Download pdf
Altered components, tainted software and shipments diverted to allow unauthorized “modifications” are alive and well in ICT. IT/OT experts on this third-party risk will explore the breadth of the risk and what can be done to address it. They will explore policy, operations and technology essential to secure the growing number of devices on which private enterprises, governments and citizens rely.

Learning Objectives:
1: Understand the complexity of the risk environment for ICT.
2: Gain awareness of the risk of unauthorized modification to ICT-via components, tainted software and more.
3: Gain tangible, feasible and effective techniques to tackle the insidious threat posed tainted parts.