Technology,
Data Privacy
Jan. 19, 2022
The supply chain risk conundrum: Rethinking the network and its risks
Current information security and risk mitigation approaches are ineffective. This is nowhere more apparent than in critical supply chains -- defense, energy, health services and infrastructure.





Michael A. Gold
Partner
Jeffer Mangels Butler & Mitchell LLP
1900 Avenue of the Stars
Los Angeles , CA 90067
Email: MGold@jmbm.com
Michael is co-chair of the firm's Cybersecurity and Privacy Group. The group counsels companies in all industries regarding compliance with state, federal and international privacy laws and regulations, establishing corporate governance frameworks and controls to establish effective information security, and in connection with security incidents and data breaches.
Current information security and risk mitigation approaches are ineffective. This is nowhere more apparent than in critical supply chains -- defense, energy, health services and infrastructure. The source of much of the persistent failure to secure supply chains and hackers' success in compromising these vital arteries of commerce is that most organizations do not recognize all of the components of their networks. This blinkered thinking leads to poor risk assessments even when information...
For only $95 a month (the price of 2 article purchases)
Receive unlimited article access and full access to our archives,
Daily Appellate Report, award winning columns, and our
Verdicts and Settlements.
Or
$795 for an entire year!
Or access this article for $45
(Purchase provides 7-day access to this article. Printing, posting or downloading is not allowed.)
Already a subscriber?
Sign In