What Lurks within Your IT: Spotlight on the Dark Side of the Supply Chain


Posted on in Presentations

Altered components, tainted software and shipments diverted to allow unauthorized “modifications” are alive and well in ICT. IT/OT experts on this third-party risk will explore the breadth of the risk and what can be done to address it. They will explore policy, operations and technology essential to secure the growing number of devices on which private enterprises, governments and citizens rely.

Learning Objectives:
1: Understand the complexity of the risk environment for ICT.
2: Gain awareness of the risk of unauthorized modification to ICT-via components, tainted software and more.
3: Gain tangible, feasible and effective techniques to tackle the insidious threat posed tainted parts.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Dawn Cappelli

Participant

Director, OT-CERT, Dragos

Edna Conway

Participant

CEO & Board Director , EMC ADVISORS


Share With Your Community