#1710225: Securing third‑party access to disrupt the supply chain attack path

Description: Topics include:

The anatomy of identity-driven intrusions across third-, fourth-, and Nth-party ecosystems
Designing scalable IAM strategies for dynamic partner ecosystems
How to operationalize “Verified Trust” as a detection and response capability
More info: https://www.scworld.com/cybercast/securing-thirdparty-access-to-disrupt-the-supply-chain-attack-path

Date added Nov. 5, 2025, 2:16 p.m.
Source SCWorld
Subjects
  • Insider Threats / Third Party / Third-Party / 3rd Party Risks / Managed Service Provider (MSP)
  • PodCasts / Webcast / Webinar / eSummit / Virtual Event etc.
  • Retail / Supply Chain Industry News