8 Pragmatic Steps to Supply Chain Risk Management presented at SourceDublin 2015

by Richard Hollis,

Summary : Did you know that over 75% of data breaches are associated with a trusted 3rd party supplier? These days the security integrity of our data is only as good as that provided by the weakest supplier to our business. 3rd party connectivity and shared information requirements have become the common denominator in assessing and addressing the security risk to the sensitive data we process such as personal details, medical records or credit card information. This presentation details 8 Simple Steps in cost-effectively establishing and maintaining good information security risk management procedures across your supply chain to prevent a breach.