Premiere: 4/16 14:00 - 14:30
Replays: 4/16 20:00 - 20:30, 4/17 02:00 - 02:30
Cybercriminals are no longer attacking organizations directly—they’re infiltrating through suppliers, software vendors, and service providers. A single weak link in your supply chain can open the door to devastating data breaches, ransomware attacks, and operational shutdowns. How can you secure your organization against threats that originate beyond your control?
Key Takeaways:
✅ How hackers exploit supply chain vulnerabilities
✅ Best practices to vet and secure third-party vendors
✅ Implementing zero-trust and continuous monitoring for stronger defenses
✅ Steps to build a resilient supply chain
Stay ahead of cyber threats—because security is only as strong as your weakest link.
TOPIC / TRACK
CYBERSEC GLOBAL 2025: United as One
LEVEL
Intermediate Intermediate sessions focus on
cybersecurity
architecture, tools, and practical applications, ideal for
professionals with a basic understanding of
cybersecurity.
SESSION TYPE
Live Stream Session
LANGUAGE
English
SUBTOPIC
Supply Chain Security
Attack Surface Management
Hackers & Threats
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。