
Sign up to save your podcasts
Or


Constant software updates and changes to code can introduce new security vulnerabilities into the technology supply chain – the hardware, software, and services we use on a daily basis. Two cyber risk management experts from The Chertoff Group – David London and Adam Isles – discuss what happens when the technology supply chain is compromised, and the ripple effects given the interconnected nature of the technology. Meanwhile, the government is considering mandates and regulatory action to protect the technology supply chain. London and Isles offer insights into why companies need to manage these risks and how some sectors are working to do it. They caution that it's a problem no company can solve alone.
By The Chertoff Group4.8
2020 ratings
Constant software updates and changes to code can introduce new security vulnerabilities into the technology supply chain – the hardware, software, and services we use on a daily basis. Two cyber risk management experts from The Chertoff Group – David London and Adam Isles – discuss what happens when the technology supply chain is compromised, and the ripple effects given the interconnected nature of the technology. Meanwhile, the government is considering mandates and regulatory action to protect the technology supply chain. London and Isles offer insights into why companies need to manage these risks and how some sectors are working to do it. They caution that it's a problem no company can solve alone.