Digital Supply Chain Security - The Exposed Flank
Offered By: YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore digital supply chain security challenges and solutions in this 44-minute conference talk from Circle City Con 2015. Delve into the complexities of global legal issues, geopolitical concerns, and human factors affecting supply chain integrity. Examine case studies on ATM fraud, intellectual property theft, and hardware trojans. Learn about ISO 28000:2007 standards and their relevance to digital security. Discover strategies for going beyond compliance, implementing defined repeatable processes, and building resilient systems. Gain insights on addressing offshore development risks, managing partner networks, and navigating the budget battle for improved security measures.
Syllabus
Intro
LEVEL SETTING
WHY I'M INTERESTED
WHAT DO I MEAN?
THE GROUND FLOOR
ISO 28000:2007
ISO 28000 HIGHLIGHTS
OUR FLANKT WHAT FLANKT THE MAGINOT LINE
CASE IN POINT...
GLOBAL LEGAL COMPLEXITY, HUMAN CHALLENGES & COMPLICATIONS
GEOPOLITICAL
LEGAL ISSUES
BLUE COAT & SYRIA
ANOTHER LEGAL ISSUE EXAMPLE, ATM FRAUD
IT WAS QUICK
THE FLOW
WHAT WENT WRONG?
INTELLECTUAL PROPERTY
SNIPS IN THE WIRE
SOURCE CODE ISSUES
PARTNER NETWORKS
WAR STORY
THE LOGINS
SPACE & TIME
THE CATCH
HARDWARE TROJANS
BATTLEFIELD ROBOTS
GO BEYOND COMPLIANCE
OFF SHORE DEVELOPMENT
HAMSTER WHEEL OF PAIN
DEFINED REPEATABLE PROCESSES
THE BUDGET BATTLE
INTERNAL APPLICATIONS
INFRASTRUCTURE DNS & WEB APPLICATIONS
BUILD TO FAIL
BAMBOO ANALOGY
Related Courses
AI for CybersecurityJohns Hopkins University via Coursera Amazon Connect Optimizing Routing Solutions
Amazon Web Services via AWS Skill Builder Compliance, Internal Audit and Fraud Governance الإلتزام والتدقيق الداخلي وحوكمة الاحتيال
edX Predictive, Prescriptive Analytics For Business Decision Making
edX Fraud Examination
Cabrillo College via California Community Colleges System