#1706821: Securing third ‑party access to disrupt the supply chain attack path
Description: |
Topics include: The anatomy of identity-driven intrusions across third-, fourth-, and Nth-party ecosystems Designing scalable IAM strategies for dynamic partner ecosystems How to operationalize “Verified Trust” as a detection and response capability |
---|---|
More info: | https://www.scworld.com/cybercast/securing-thirdparty-access-to-disrupt-the-supply-chain-attack-path?utm_source=marketing-campaign&utm_medium=email&utm_campaign=web-PINGIdentity-2025-10-08&nbd=&nbd_source=mrkto |
Date added | Oct. 13, 2025, 9:43 p.m. |
---|---|
Source | SCWorld |
Subjects | |
Venue | Oct. 22, 2025, midnight - Oct. 22, 2025, midnight |