Cyber Ratings - Partner with Your Suppliers to Defend the Extended Attack Perimeter
Notice: See below for CPE Policy.
Abstract
The build vs. buy decision has been made; when an organization needs a new capability, they don’t develop it internally, they look outward to suppliers and vendors. The average company relies on hundreds, if not thousands, of suppliers and vendors to run its business, and benefits from the specialization and competencies they provide. That being said, the benefits suppliers and vendors provide come at a cost; the overwhelming majority of today’s breaches are byproducts of attacks on the supply chain. When an attacker decides they want to compromise a business, they direct their efforts at the supply chain, and use the privileged access afforded to suppliers and vendors to infiltrate a business. Why? Because attackers know that our focus tends to be on our own perimeter, and that we lack the ability to continuously monitor and mitigate against the cyber risks that exist across our supply chains.
Enter the cyber rating, which Gartner predicts will be as important as the credit rating by 2022. Whether your use-case is focused on supply chain onboarding, monitoring or regulatory compliance, Cyber Ratings can help to level the playing field by enabling the continuous monitoring of the cyber risks that exist across your supply chain.
About Our Speaker

Alex Rich
VP, Marketplace Business Development SecurityScorecard
Alex Rich is the VP, Marketplace Business Development for Alliances, at SecurityScorecard. He has been with the organization for three years, and previously held roles in Customer Success (Director of Customer Success – Responsible for Enterprise and Strategic Accounts) and Inside Sales (Director of Inside Sales – Led NY based Inside Sales Team). Prior to SecurityScorecard, Alex was a Senior Customer Success Manager at Sisense, where he was responsible for OEM and Strategic Accounts.
Agenda
5:00 PM – 6:15 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
Webinar Rates
ISACA, IIA, ISSA,
ACFE, OWASP |
Non-Members | Full-Time Students & Faculty |
|
Rate |
$0 | $10 | $0 |
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
*Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.