3rd Party Risk Management , Critical Infrastructure Security , Events

Techniques to Improve Supply Chain Confidence

Highlights from ISACA's Supply Chain Security Report
Rob Clyde, ISACA board director and past board chair

Former ISACA board chair Rob Clyde shares highlights from ISACA's Supply Chain Security Gaps: A 2022 Global Research Report, in which 25% of respondents say they experienced a supply chain attack last year. Clyde recommends that organizations periodically conduct risk assessments and penetration tests on their own software as well as the software of their suppliers.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

In a video interview with Information Security Media Group at RSA Conference 2022, Clyde discusses:

  • Findings from the survey;
  • Supply chain challenges for organizations;
  • How enterprises can improve their understanding of supply chain risk and better protect themselves.

Clyde is executive chair of the board of directors for White Cloud Security, a provider of trusted app list enforcement, and independent board director for Titus, a leader in data protection, categorization and classification. He is the managing director of Clyde Consulting LLC, which provides board and executive advisory services to cybersecurity software companies, and he serves as an executive advisor to BullGuard, a consumer and small business security software company.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.