Introduction by Tag Cyber

Nowhere is Supply Chain Risk more pronounced than the Federal Government. DHS CISA provides extensive guidance on everything from software, hardware, policies, and procedures to people on staff and third-party providers. In this video, hear Ed Amoroso, of TAG Cyber and Allan Friedman of CISA, as they dig into the Software Bill of Materials and the importance of tracking and understanding its components as part of Supply Chain Risk.


Up Next:

  • 25:41 Introduction by Tag Cyber

    Nowhere is Supply Chain Risk more pronounced than the Federal Government. DHS CISA provides extensive guidance on everything from software, hardware, policies, and procedures to people on staff and third-party providers. In this video, hear Ed Amoroso, of TAG Cyber and Allan Friedman of CISA, as they dig into the Software Bill of Materials and the importance of tracking and understanding its components as part of Supply Chain Risk.


    Up Next:

IR Partner Technology Discussion of Recent Supply Chain Incidents

What made the SolarWinds and Kaseya attacks unique and how did clients react? What can you do to prevent future exposure from similar attacks? In this video, practitioners in the field will talk about the challenges that incident responders face, what approach they should take to learn more about attack origins, and how to keep your organization protected from similar threats.


Up Next:

  • 36:33 IR Partner Technology Discussion of Recent Supply Chain Incidents

    What made the SolarWinds and Kaseya attacks unique and how did clients react? What can you do to prevent future exposure from similar attacks? In this video, practitioners in the field will talk about the challenges that incident responders face, what approach they should take to learn more about attack origins, and how to keep your organization protected from similar threats.


    Up Next:

Data Security Law Firms - Managing & Preventing Complex Incidents

What are the characteristics of Supply Chain attacks and how should you prepare for them? Our panel of attorneys dig into how the Government is addressing supply chain risk, what type of notice is anticipated in international events, and who will be assigned liability, and share best practices to reduce client exposure for pre- and post-incident.


Up Next:

  • 45:40 Data Security Law Firms - Managing & Preventing Complex Incidents

    What are the characteristics of Supply Chain attacks and how should you prepare for them? Our panel of attorneys dig into how the Government is addressing supply chain risk, what type of notice is anticipated in international events, and who will be assigned liability, and share best practices to reduce client exposure for pre- and post-incident.


    Up Next:

Cyber Insurance and Risk Transfer - A Market in Transition

What systemic risks concern the insurers and reinsurers the most? Can they be insured? Are the insurers seeing the benefit of those insured who are using MFA, secure backups, and recovery plans? Are the models changing? What pricing should buyers expect to see in the next 12 months in response to cyber risks? Our Insurance panel will address all these questions and more in this video.


Up Next:

  • 46:23 Cyber Insurance and Risk Transfer - A Market in Transition

    What systemic risks concern the insurers and reinsurers the most? Can they be insured? Are the insurers seeing the benefit of those insured who are using MFA, secure backups, and recovery plans? Are the models changing? What pricing should buyers expect to see in the next 12 months in response to cyber risks? Our Insurance panel will address all these questions and more in this video.


    Up Next:

Supply Chain and Risk
Legal, Technology, Insurance

Hear from the industry's leaders about how to stay above the most devastating cyber risk of modern-day supply chain attacks.

Request More Info