YoVDO

How to Reduce Supply Chain Risk - Lessons from Efforts to Block Huawei

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Network Security Courses Risk Assessment Courses Risk Mitigation Courses Continuous Monitoring Courses

Course Description

Overview

Explore a panel discussion from the RSA Conference examining supply chain risk management through the lens of efforts to block Huawei. Gain insights from cybersecurity experts and government officials as they debate the complexities of assessing and mitigating risks in global technology supply chains. Delve into topics such as software development processes, allegations of backdoors, and the challenges of building reliable networks. Learn about best practices for risk assessment, transparency, and stakeholder communication. Examine the interplay between national security concerns, trade policies, and technological innovation. Discover approaches to continuous monitoring, cybersecurity maturity models, and independent testing protocols. Consider the broader implications for 5G network development, IP law enforcement, and the future of global technology ecosystems.

Syllabus

Introduction
Agenda
Annie Bruce
Katherine Waldron
Can we build a reliable network
How do you secure everything
Is supply chain risk by country of origin
Risk mitigation
The risk isnt spying
Backdoors
Continuous Monitoring
America is not ready
Backdoors in supply chain
Security vs Surveillance
Cultural Shift in DoD
Play Both Ways
China Ignoring IP Law
No cartons of the world
Risk does not commute
A plausible argument
Why build a 5G network
Objective criteria and testing
Cybersecurity maturity model
Testing and standards
Independent testing
Human technology
Threelegged stool
Security is an insurmountable problem
Youre the supply chain
What tools are there
Are there resources out there
Baking security protocols
Innovation investments
Holding the line
We did the wrong thing
China and 5G


Taught by

RSA Conference

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity