Premiere: 4/16 14:00 - 14:30
Replays: 4/16 20:00 - 20:30, 4/17 02:00 - 02:30
Cybercriminals are no longer attacking organizations directly—they’re infiltrating through suppliers, software vendors, and service providers. A single weak link in your supply chain can open the door to devastating data breaches, ransomware attacks, and operational shutdowns. How can you secure your organization against threats that originate beyond your control?
Key Takeaways:
✅ How hackers exploit supply chain vulnerabilities
✅ Best practices to vet and secure third-party vendors
✅ Implementing zero-trust and continuous monitoring for stronger defenses
✅ Steps to build a resilient supply chain
Stay ahead of cyber threats—because security is only as strong as your weakest link.
TOPIC / TRACK
CYBERSEC GLOBAL 2025: United as One
LEVEL
中階 中級議程聚焦在資安架構、工具與實務應用等,適合已經具備資安基礎的資安與資訊人員。
SESSION TYPE
Live Stream Session
LANGUAGE
英文
SUBTOPIC
Supply Chain Security
Attack Surface Management
Hackers & Threats