Part 7 - Supply Chain

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
48 minutes
Difficulty
Advanced
Video Transcription
00:04
supply chain.
00:05
When we think of these words, what imagery comes to mind? Suppliers? Distributors? What about your business partners?
00:12
A great example is if you think of a defense contractor who is accessing the government's networks or highly sensitive projects as a result of the contract that was awarded,
00:23
this contractor is now part of the supply chain.
00:26
So now let's see how the supply chain directly impacts cyber security considerations.
00:32
Well,
00:33
unless you've been living on a deserted island for over three years, it's highly unlikely that you haven't heard of the OPM where the target preaches.
00:41
In both cases, each sustained unauthorized access through their business partner.
00:47
Allowing system resource is to be manipulated and ultimately resulting in massive data preaches.
00:54
Now
00:55
let's take a look at the similarities and the differences between these two.
00:59
When we look at the following table that illustrates both opium and target,
01:03
you can clearly see where these organizations had similarities. But more importantly,
01:10
where they were different, OPM was not able to offset the cost of the breach, either by an insurance instrument
01:17
or about being able to push those costs back to 1/3 party.
01:21
And why is that
01:23
because up until the latter part of 2015
01:26
no language existed
01:29
in government procurement documents
01:32
that entitled the government
01:34
to seek financial restitution for these types of cases.
Up Next