Episode 10

full
Published on:

13th May 2021

#10 Supply Chain Risk (with Vincent Thiele)

News of business impacts from the realisation of cyber risks is all around us. Many of the largest breaches in recent years have involved one or more suppliers in some way. Few will be unaware of Sunburst/Solorigate, and many will have been directly impacted or know people that have been. But it is not just your direct suppliers, or your technology supply chain, that can suffer from a cyber attack that impacts you, as is clear to many following the Colonial Pipeline attack. Do you know who your suppliers suppliers are? Are you gaining any assurance of the cyber security of your non-technology suppliers? Are you assessing during on-boarding only or monitoring over time?

In this episode Martin and Maurice are joined by Vincent Thiele to discuss Supply Chain Risk. How can you identify threats and manage risks originating from the whole graph of your suppliers, their suppliers, ...? Where should you concentrate your efforts and what can you do to meaningfully measure the security posture of suppliers?

Show artwork for Attributive Security

About the Podcast

Attributive Security
The podcast anchored in the expression “security is a property of something else”.
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable.

Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.

About your hosts

Martin Hopkins

Profile picture for Martin Hopkins
Martin is a cyber security leader and an experienced consultant most recently specialising in technical and business security advisory, and enterprise and technical security architecture. A regular speaker on cyber security topics, he is a strong advocate of business driven security, balanced risk management, and enterprise security architecture.

With over 25 years' experience in technology, primarily in security related fields, Martin has extensive experience in financial services having been engaged by leading global institutions.

Prior to his current focus on security architecture and risk he was a security testing consultant working on everything from mainframe systems to IoT devices and has a background in system software development for information security and virtualisation.

Maurice Smit

Profile picture for Maurice Smit
A Principal Security Consultant and SABSA Instructor, with over 20 years of experience in IT Security operations, management, governance and architecture, in a variety of industries including finance, healthcare, OT and pharmaceuticals. Maurice delivers accredited SABSA training in Europe, India, Africa and the Middle East

He is a founding member of the SABSA Institute Board of Trustees and was one of the first people in Europe to achieve SABSA Master Certification.

Maurice has contributed significantly to the development of the SABSA methodology, including co-authoring the “SABSA for Enterprise Risk Management” training course and leads the volunteer effort “SABSA World” with the aim of establishing regional SABSA communities of interest.