Skip to main content

Supply Chain Cyber Security Risk Management

Code: 2014 Category: Tag:

This course provides an introduction to fundamental cybersecurity risk management concepts and how they are applied to modern supply chains. Attendees will learn how to identify critical suppliers, assess risk in third and fourth-party relationships, and identify mitigation strategies. The course covers risks associated with hardware, software, and services acquired from external sources, and attendees will learn strategies for analyzing, treating, and monitoring cyber risk throughout the supply chain.

Supply Chain Cyber Security Risk Management Delivery Methods



Supply Chain Cyber Security Risk Management Course Benefits

Identify supply chain components in modern organizations, including hardware, software, and services

Inventory critical assets and suppliers, and assess the risks they pose to your organization

Understand risk mitigation options, and how to adapt them to address complex risks across the supply chain

Implement risk management frameworks and build a supply chain risk management plan

Audit and perform oversight of supply chain risk to monitor risk mitigation effectiveness

Continue learning and face new challenges with after-course one-on-one instructor coaching

Supply Chain Cyber Security Risk Management Instructor-Led Course Outline
Important Supply Chain Cyber Security Risk Management Information


To be successful in this course, some experience with risk management and business management is helpful but not required.
Basic product development knowledge is beneficial, such as software development lifecycles and integrating components into a final product.

Who should attend?

Risk managers, looking to extend risk management programs to external third parties, suppliers, and vendors.
Security practitioners, tasked with holistic risk management.
Module 1: Risk Management Basics
Module 2: Supply Chain Basics
Module 3: SCRM Tools & Practices
Module 4: Compliance Frameworks, SCRM Vendors, and Tools

Request Quotes

Register now

Please type the characters This helps us prevent spam, thank you.

Red Hat OpenStack Administration III (CL310) Training

Agile Programming Professional Training and Certification

jQuery Best Practices for Legacy and Today

Stealthwatch Cloud Foundations 7.3 (SWCF)

Designing and Implementing a Data Science Solution on Azure (DP-100)

CompTIA PenTest+ Certification Training

Implementing and Configuring Cisco Identity Services Engine (SISE)

SAP BW powered by SAP HANA (BW362) Training

Introduction to DAX for Power BI

ITIL® 4 Foundation Training