CHAPTER 5Supply Chain Risk Management
Doug’s team at Deluxe Security and Surveillance Systems Inc. is developing and installing a new type of motion detection alarm system when the avatar of a junior security engineer, Paige, pops up in a group chat on the company’s secure comms channel. “That’s odd,” Doug thinks. He just saw Paige leave the building’s tightly controlled facility, saying something about a dental appointment. He steps out of his office and sticks his head into Paige’s office near the server room. She’s not there.
“She must be somewhere else in the building,” Doug says to himself – this particular comms channel is accessible only from Deluxe’s secure location. He continues working. Paige’s avatar stays in the group chat. After a few hours, he sees Paige walk by his office door. He glances up from his ...
Get Cybersecurity Risk Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.