
Sign up to save your podcasts
Or
Takeaways
Chapters
00:00 Introduction and the Importance of Identifying Third Parties
03:02 Defining Supply Chain Risk Management
09:44 The Risks of Shadow IT Vendors
13:28 Building Relationships with Critical Vendors
17:18 The Challenges of Fourth-Party Risk Management
20:09 Tools for Scanning and Monitoring Vulnerabilities
23:03 Key Recommendations for CISOs and CIOs
Takeaways
Chapters
00:00 Introduction and the Importance of Identifying Third Parties
03:02 Defining Supply Chain Risk Management
09:44 The Risks of Shadow IT Vendors
13:28 Building Relationships with Critical Vendors
17:18 The Challenges of Fourth-Party Risk Management
20:09 Tools for Scanning and Monitoring Vulnerabilities
23:03 Key Recommendations for CISOs and CIOs