Thanks to our moderators and the LegalSEC Steering Committee for this roundtable. Click here for the slides with contact information
The vulnerability risk profile of your technology stack is constantly changing. Bugs and vulnerabilities are discovered every day and it is inevitable they will be exploited as we’ve seen with Log4j and the SolarWinds hacks. These supply chain risks have rapidly become a new frontier for enterprising threat actors. The question is, are you prepared to effectively respond the next time?
Scott Rolf, CIO at Tucker Ellis LLP
Paul Bivian, Director Information Security at Kirkland & Ellis LLP#roundtable#Security#RiskManagement#LegalSEC