• Online, Self-Paced
Course Description
In this session, Ed Amoroso covers 5 areas of focus to understand and reduce supply chain risks; review processes, inspect hardware/software, specify vendor requirements, monitor for vendor issues, and proxy comms to unknown sources.

Learning Objectives

No organization lives in a vacuum. The cyber supply chain is massive but is often the weakest link. With supply chains getting more complex, it is time for security leaders to start working closely with procurement to maintain a complete line of sight into their vendor portfolios. Attackers routinely target supply chains, and unproven vendors present a major risk when outsourcing to lesser-known suppliers overseas.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Program/Project Management and Acquisition
  • Executive Cyber Leadership

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.