Cybersecurity

Procurement Risk – Limited Visibility of the Supply Chain

Posted: 10/04/2019 - 23:44
A few weeks ago, I reviewed the 2018 Deloitte Global Chief Procurement Officer Survey and was not surprised that cost reduction, new products/market development and managing risks remain the top three business strategies for procurement. Sixty-five percent (65%) of procurement leaders report having limited or no visibility beyond their Tier 1 suppliers.

Infosecurity Europe 2019

Posted: 05/31/2019 - 20:46
Infosecurity Europe, Europe's largest information security event, will open its doors from Tuesday 4th to Thursday 6th June 2019 at Olympia, Hammersmith in London, bringing together business, technology and cyber communities to discuss and discover the best way to protect organisations and individuals.
 

Why Going Alone in Cybersecurity is a Non-Starter

Posted: 02/07/2019 - 01:47
Are cybersecurity threats overblown or hyped up? It would be nice if that were the case. Then we’d have one less bucket of things to worry about. 
 
Unfortunately, the headlines are not fiction. Bad actors are stealing data, inflicting pain, and damaging corporate finances and brand reputations every single day. And it appears that they will continue doing so. 
 

Exploring the Capabilities of an Interconnected World with Kazu Gomi

Posted: 12/12/2018 - 10:18

In this episode of the Sourcing Industry Landscape, Dawn Tiura interviews Kazu Gomi. Kazu Gomi, CEO of NTT America, ranks as the 4th largest telecommunication company in the world. We learn the breadth and depth of NTT’s capabilities, from system integration, (they acquired Dell Services a few years ago) and are also one of the largest security companies in North America. 

Software Supply Chain Risk Management: Leveraging Standards to Communicate Expectations

Posted: 10/26/2018 - 00:41
Growing concerns related to dependencies on software-reliant information communications technology (ICT) and Internet of Things (IoT) devices are pushing changes in governance associated with supply chain risk management (SCRM). The possibility of disruption exists because the software that enables critical capabilities is vulnerable and exploitable. Exploit potential is often more about the vulnerability of assets in target organizations than the ingenuity of the attackers.

Pages

Subscribe to RSS - Cybersecurity