Instructor-Led Training (Live)

Supply Chain Security

Length
0 h

About Course

In today’s interconnected world, the integration of technology into supply chains has significantly enhanced operational efficiency and global reach. However, this integration has simultaneously introduced considerable cybersecurity risks that necessitate urgent attention. Supply chains are increasingly targeted by sophisticated cyberattacks due to their complexity and the valuable of the data they handle, making cybersecurity a critical concern for ensuring the continuity and resilience of supply chain operations. Integrating cybersecurity training into supply chain management is critical to safeguarding against the increasing threat of cyberattacks.

Objectives

Upon successful completion of this course, participants will be able to:

  • Define the confidentiality, integrity and accessibility (CIA) framework for organizations
  • Describe common types of cyber-attacks and cyber threat actors
  • Explain the integration of Supply Chain Cybersecurity Risk Management into enterprise-wide risk management processes
  • Identify and assess the various types of cybersecurity risks throughout supply chains
  • Develop strategies to mitigate identified supply chain cybersecurity risks
  • Assess the requirements and applicability of the General Data Protection Regulation, the California Consumer Privacy Act, and other data regulations such as PCI-DSS and HIPAA
  • Discuss real-world case studies involving supply chain compromises to identify controls and policies that may have mitigated or prevented the compromises or improved recovery
  • Assess the need for implementing the identified controls in their own organization

Target Audience

Senior leaders/senior management of critical infrastructure, chief information security officers (CISO), chief technology officers (CTO), risk management personnel from organizations such as healthcare, maritime, rail, ground and air.

Prerequisites

Coming Soon!

This course is still in development.

Register

Requirements

This is a government-sponsored, live course. Areas shown in blue require government approval to register.

Contact the administrative agency of your state, tribe, or territory before registering.

FEMA Courses require a Student ID for registration. Get your FEMA SID here.

Upcoming

Nothing upcoming.

Online

Register online through our partner.

Phone

(979) 431-4837

Website

http://teex.org/program/cybersecurity/

Future

To sign up for a future delivery for this course, join the waitlist by reaching out via the contact information. Click below to send a prefilled email.

Phone

(979) 431-4837

Website

http://teex.org/program/cybersecurity/

congressionally Funded Training Available

Thousands trained nationwide.

Join the NCPC mailing list