Supply Chain Risk is more pertinent now that digital transformation initiatives are the norm. In a recent Ponemon study, 82% of respondents believe their organization experienced at least one data breach due to digital transformation. At the same time, 55% said with certainty that at least one of the three breaches was caused by a third party. Reporting on SCRM and gaining visibility into the cyber risk across third parties is critical to the security of both small and large organizations, especially in the digital age we live in.
You seem to be interested in what's here, but haven't registered for an account yet or perhaps haven't logged in.
When you create an account, we will be able to remember what you've already read, so you can pick up exactly where you left off when you come back.
Oh, and it'll also get rid of this really annoying box :)
Protective intelligence lessons from the U.S. Capitol riot for companies
After a lifetime in the protection business, the one constant in Washington that I’ve learned is that it takes tragedy to force change. The January 6 Capitol riot is not an enigma. This was a clear protective intelligence failure. The key finding of Retired Army Lt. Russel Honore’s report reviewing how the pillar of U.S. democracy could have been so easily infiltrated is that the U.S. Capitol Police (USCP) must better integrate intelligence into its operations through improved awareness, assessment, sharing, and response capabilities. We can look at effective protective intelligence as a three-part story: Act I is identifying threats; Act II is building those threats into a cohesive profile; Act III is sharing and acting on that information in order to make nothing happen. Applying this framework to January 6 helps us understand how we can and must do better and provides important takeaways for corporations.