11192122 - Cybersecurity Training Book

…CONTINUED

 What is the role of cybersecurity in contracts with third-party support vendors and crucial suppliers.

 Have you discussed these types of concerns and risks with them?

 What mechanisms and products are used to share cyber threat information within your organization and external to your organization (e.g. distribution lists, information sharing portals, broadcast messaging)?

Made with FlippingBook - Online catalogs