Course Curriculum

    1. 1.1. The Current Cyber Threat Landscape – An Introduction

      FREE PREVIEW
    2. 1.2. Well Known Supply Chain Attacks and their Associated Impact

    3. 1.3. What is Wrong with Current Processes and Procedures?

    4. Assignment 1 - Evaluating Supply Chains

    1. 2.1. How do you Classify Your Vendors to Deliver Outcomes?

    2. 2.2. What are the Common Attack Vectors and Tactics Used by Cyber Criminals to Target Supply Chains?

    3. 2.3. Identifying Risks, Misconfigurations and Vulnerabilities

    4. 2.4. How to Prioritise Mitigation Efforts

    5. Questionnaires and Compliance Frameworks

    6. Assignment 2 - Vendor Classification According to Function

    1. 3.1. Technology Solutions for Risk Mitigation

    2. 3.2. Developing Cybersecurity Policies to Mitigate and Manage Supply Chain Compromise

    3. Assignment 3 - Policies and Controls

    1. 4.1. Engaging Suppliers on Cybersecurity

    2. 4.2. Conducting Supplier Risk Assessments

    3. 4.3. Legal Considerations

    4. 4.4. Monitor Supplier Performance and Address Security Deficiencies

    5. Assignment 4 - Stronger Relationships

    1. 5.1. Which EU Regulations and Directives Require Supply Chain Cyber Risk Management?

    2. 5.2. Other Regulations, Directives, Standard and Frameworks Which Require Supply Chain Cyber Risk Management

    3. Assignment 5 - Regulations and Standards

About this Course

  • £24.95
  • 28 lessons
  • 0 hours of video content

Discover your potential, starting today