Panel discussion: Securing data in the supply chain

    1. Location
      Keynote Theatre

Panel discussion: Securing data in the supply chain

23 Apr 2013, 12:30 - 13:30

Keynote Theatre

Language:
English (United Kingdom)

Supply chains are integral to how businesses operate today and they are becoming increasingly complex. As organisations share more and more information with third parties and offer multiple communication channels to clients, they are at increased risk of compromise. Third parties have their own supply chains over which you have no control. If a third party supplier or one of their third parties suffers a breach, you are still liable for your data. Do you know where your data is stored and what are the implications for data protection and compliance? How do you manage your third party suppliers and enforce your standards and controls? And do you really know where the end of your supply chain is?

This session will provide you with a checklist of practical hints and tips to enable you to assess the security of your supply chain and identify practical measures to secure it. The panel will share real life examples and best practice, ensuring that you are equipped with the knowledge and know-how to secure data in your supply chain.

  • Learn how to assess third parties and conduct a thorough risk assessment
  • Establish how to exchange information with third parties as securely as possible
  • Benefit from practical hints and tips on how to manage the third party of a third party
  • Understand what sort of identity and access management you should have in place
  • Identify appropriate governance strategies to secure data in your supply chain
  • Find out what standards, checks and controls are appropriate for measuring third party security
  • Discover how to build controls into contracts

 

Contributors

Business Issues Covered

• Deliver security to drive and enable clear business growth • Demonstrate clear thought leadership to ensure security is high on the corporate agenda and capex justified • Ensure information security projects demonstrate return on investment • Identify internal and external threats and keep a business secure • Benchmark your security posture and strategy against your peers

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.