Supply chain attacks have become the preferred method of many cyber threat actors. This has implications for all organisations, and carries added weight for those in regulated industries. The EU’s Digital Operational Resilience Act (DORA), which targets third-party IT suppliers to the financial sector, is just one example of how regulators and legislators are attempting to combat this risk.
Our downloadable PDF will guide you through what the threat of cyber risk means for your organisation, how you can assess and reduce this risk, and what the emerging and current trends are.
Download your eBook today and be ready for tomorrow’s challenges.
Fill out the form to download your copy
Our Clients
Insights
Understanding inherent risk and residual risk
Knowing the difference between inherent risk and residual risk is key to good risk management processes.
Managing third-party cyber risk in the supply chain
Third parties are often a vital part of delivering mission-critical products and services on behalf of client organisations.
From hackers to hurricanes: Risk management in the wild
What is third party and vendor risk management, and why is it important?
Inside Edge: The NHS’s Chris Wagner on procurement challenges
Managing risks in such a huge organisation is no easy task, especially in healthcare where the stakes are so high.