Webinar length: 60 min.
Today’s organizations rely on supply chains, vendors, partners and others to conduct business. For most companies, that list of third-party providers is long and can create significant risk. Often those supply chain vulnerabilities lead to public breaches.
Listen to our Information Technology Services Director Rob Pyles and Manager Ray Tefft as they describe what occurs to your supply chain when key vendors are attacked, including:
This webinar qualified for 1.0 hour of CPE based on Ohio CPE requirements. |
||
*To be eligible for CPE credit you must have attended the live session of the webinar and have completed and submitted the required documentation. |
To access the webinar recording, please submit the form below.
Speakers
Robert Pyles
Director of Information Technology Services
Ray Tefft
Manager of Information Technology Services