Главная
Study mode:
on
1
Intro
2
LEVEL SETTING
3
WHY I'M INTERESTED
4
WHAT DO I MEAN?
5
THE GROUND FLOOR
6
ISO 28000:2007
7
ISO 28000 HIGHLIGHTS
8
OUR FLANKT WHAT FLANKT THE MAGINOT LINE
9
CASE IN POINT...
10
GLOBAL LEGAL COMPLEXITY, HUMAN CHALLENGES & COMPLICATIONS
11
GEOPOLITICAL
12
LEGAL ISSUES
13
BLUE COAT & SYRIA
14
ANOTHER LEGAL ISSUE EXAMPLE, ATM FRAUD
15
IT WAS QUICK
16
THE FLOW
17
WHAT WENT WRONG?
18
INTELLECTUAL PROPERTY
19
SNIPS IN THE WIRE
20
SOURCE CODE ISSUES
21
PARTNER NETWORKS
22
WAR STORY
23
THE LOGINS
24
SPACE & TIME
25
THE CATCH
26
HARDWARE TROJANS
27
BATTLEFIELD ROBOTS
28
GO BEYOND COMPLIANCE
29
OFF SHORE DEVELOPMENT
30
HAMSTER WHEEL OF PAIN
31
DEFINED REPEATABLE PROCESSES
32
THE BUDGET BATTLE
33
INTERNAL APPLICATIONS
34
INFRASTRUCTURE DNS & WEB APPLICATIONS
35
BUILD TO FAIL
36
BAMBOO ANALOGY
Description:
Explore digital supply chain security challenges and solutions in this 44-minute conference talk from Circle City Con 2015. Delve into the complexities of global legal issues, geopolitical concerns, and human factors affecting supply chain integrity. Examine case studies on ATM fraud, intellectual property theft, and hardware trojans. Learn about ISO 28000:2007 standards and their relevance to digital security. Discover strategies for going beyond compliance, implementing defined repeatable processes, and building resilient systems. Gain insights on addressing offshore development risks, managing partner networks, and navigating the budget battle for improved security measures.

Digital Supply Chain Security - The Exposed Flank

Add to list
00:00
44:25