Think You Know Your Supply Chain? Think Again

Jul 5, 2022
Kenna Security

Share with Your Network

Most CISOs are thinking about their supply chains these days, and it’s not only because supply chain disruption has been a leading business story since the start of the global pandemic. Many companies saw their once reliable network of suppliers and distributors crumble as access to goods and services dried up and lockdowns prevented timely transport.

That was a logistical problem. But your supply chain, it turns out, may also represent one of your biggest cybersecurity weaknesses. If you don’t believe it, check the details surrounding the 2020 SolarWinds attack.

Any third party with whom you share data, transactional relationships, logins, and other privileges can make you susceptible to attack. Their vulnerabilities become your vulnerabilities. Their lack of cybersecurity diligence can result in your next breach. That’s why supply chain attacks are so attractive to bad actors: One well-placed exploit can have a damaging ripple effect across hundreds, even thousands of organizations. 

Learn what it takes to secure your supply chain

In a new webinar now available for on-demand viewing, Jerry Gamblin, director of security research, Kenna Security at Cisco, explains that the first step in securing your supply chain is, quite simply, understanding your supply chain. (This isn’t trivial: Today’s supply chains are so complex that just 6% of companies say they have full visibility into theirs.)

In “Supply Chain Security 101: Understanding Your Supply Chain and Your Risks,” Gamblin not only covers supply chain security basics but also helps you break down the steps necessary to better understand your supply chain and then build the roadmap you need to secure it.

Register for this on-demand webinar to learn:

  • What exactly is a supply chain 
  • What supply chain security is—and more importantly, what it isn’t 
  • How to better understand your chain and what it does 
  • Where your risks lie and what that means for your plan 
  • Why supply chain security can amplify your risk management efforts 

View it now, and you’ll also earn one CPE credit through ISC².


Read the Latest Content

Threat Intelligence

18+ Threat Intel Feeds Power Modern Vulnerability Management

You need lots of threat intelligence feeds to cover all of the threat and vulnerability data categories in the world. Learn about the threat intel feeds...
Data Science

Ask Us About Our Data Science

In vulnerability management, data deluge is a recurring problem. Learn what data science is and how it can help your company.
Risk-Based Vulnerability Management

What is Modern Vulnerability Management?

Modern vulnerability management is an orderly, systematic, and data-driven approach to enterprise vulnerability management.

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.