-
Start Time:
02:10PM
-
End Time:
02:30PM
-
Day:
Day 1
Talk:
- Creating a strategy for selection, approval and management of third parties
- Understanding your stakeholders and their individual requirements, and where this causes vulnerabilities
- Taking a risk-based approach to all new and existing interactions
Associated Speakers:
×
Joyce Rodriguez
Head of Cyber Threat Prevention
Shell
02:10PM - Day 1
View The weakest link – securing your supply chain