Skip to Content
Cybersecurity Risk Management
book

Cybersecurity Risk Management

by Cynthia Brumfield, Brian Haugli
December 2021
Intermediate to advanced
224 pages
4h 41m
English
Wiley
Content preview from Cybersecurity Risk Management

CHAPTER 5Supply Chain Risk Management

Doug’s team at Deluxe Security and Surveillance Systems Inc. is developing and installing a new type of motion detection alarm system when the avatar of a junior security engineer, Paige, pops up in a group chat on the company’s secure comms channel. “That’s odd,” Doug thinks. He just saw Paige leave the building’s tightly controlled facility, saying something about a dental appointment. He steps out of his office and sticks his head into Paige’s office near the server room. She’s not there.

“She must be somewhere else in the building,” Doug says to himself – this particular comms channel is accessible only from Deluxe’s secure location. He continues working. Paige’s avatar stays in the group chat. After a few hours, he sees Paige walk by his office door. He glances up from his ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Cybersecurity Guide to Governance, Risk, and Compliance

The Cybersecurity Guide to Governance, Risk, and Compliance

Jason Edwards, Griffin Weaver
NIST Cybersecurity and Risk Management Frameworks

NIST Cybersecurity and Risk Management Frameworks

ACI Learning, Adam Gordon, Zachary Memos
Building a Cyber Risk Management Program

Building a Cyber Risk Management Program

Brian Allen, Brandon Bapst, Terry Allan Hicks

Publisher Resources

ISBN: 9781119816287Purchase Link