Time
48 minutes
Difficulty
Advanced
CEU/CPE
1

Video Transcription

00:04
supply chain.
00:05
When we think of these words, what imagery comes to mind? Suppliers? Distributors? What about your business partners?
00:12
A great example is if you think of a defense contractor who is accessing the government's networks or highly sensitive projects as a result of the contract that was awarded,
00:23
this contractor is now part of the supply chain.
00:26
So now let's see how the supply chain directly impacts cyber security considerations.
00:32
Well,
00:33
unless you've been living on a deserted island for over three years, it's highly unlikely that you haven't heard of the OPM where the target preaches.
00:41
In both cases, each sustained unauthorized access through their business partner.
00:47
Allowing system resource is to be manipulated and ultimately resulting in massive data preaches.
00:54
Now
00:55
let's take a look at the similarities and the differences between these two.
00:59
When we look at the following table that illustrates both opium and target,
01:03
you can clearly see where these organizations had similarities. But more importantly,
01:10
where they were different, OPM was not able to offset the cost of the breach, either by an insurance instrument
01:17
or about being able to push those costs back to 1/3 party.
01:21
And why is that
01:23
because up until the latter part of 2015
01:26
no language existed
01:29
in government procurement documents
01:32
that entitled the government
01:34
to seek financial restitution for these types of cases.

Up Next

Corporate Cybersecurity Management

Cyber risk, legal considerations and insurance are often overlooked by businesses and this sets them up for major financial devastation should an incident occur.

Instructed By

Instructor Profile Image
Carter Schoenberg
Executive VP of IPKeys Power Partners
Instructor