Posted on
in Presentations
Threat actors are constantly attempting to find and exploit the least common denominator–often a blip in the software supply chain. While the business impact of a third party vendor can be transformative, they simultaneously exacerbate the attack surface and pathways for threat actors. This session will explore five steps toward achieving resilience when it comes to assessing third party vendors.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community