Understanding Your Digital Supply Chain Risk

Bottom Line Up Front:

  • Ensure that COTS/Third Party Suppliers/SaaS are documented on the security context diagram, threat model, CMDB, and any other sources of record, as well as…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
CPF Coaching

Founder/Coach CPF-Coaching.com — I am a cybersecurity professional, career coach, podcaster, adjunct professor, author, dad, and so much more.