Faster research workflows · 10% .edu discount
Secure, compliant transcription
Court-ready transcripts and exhibits
HIPAA‑ready transcription
Scale capacity and protect margins
Evidence‑ready transcripts
Meetings into searchable notes
Turn sessions into insights
Ready‑to‑publish transcripts
Customer success stories
Integrations, resellers & affiliates
Security & compliance overview
Coverage in 140+ languages
Our story & mission
Meet the people behind GoTranscript
How‑to guides & industry insights
Open roles & culture
High volume projects, API and dataset labeling
Speak with a specialist about pricing and solutions
Schedule a call - we will confirmation within 24 hours
POs, Net 30 terms and .edu discounts
Help with order status, changes, or billing
Find answers and get support, 24/7
Questions about services, billing or security
Explore open roles and apply.
Human-made, publish-ready transcripts
Broadcast- and streaming-ready captions
Fix errors, formatting, and speaker labels
Clear per-minute rates, optional add-ons, and volume discounts for teams.
"GoTranscript is the most affordable human transcription service we found."
By Meg St-Esprit
Trusted by media organizations, universities, and Fortune 50 teams.
Global transcription & translation since 2005.
Based on 3,762 reviews
We're with you from start to finish, whether you're a first-time user or a long-time client.
Call Support
+1 (831) 222-8398Speaker 1: In this lesson, we expand risk management beyond our network perimeter to the supply chain. There are two types of supply chains, upstream and downstream. The downstream supply chain consists of customers and other private and public entities that receive products, services, or regulatory reports. They are essential in business continuity planning, but we focus on upstream supply chain risk in this lesson. Upstream supply chains provide products and servers that enable business operation. Upstream connections include materials for manufacturing, supplies for distribution, office supplies, and software maintenance and updates. The upstream supply chain does not stop with immediate suppliers. Those suppliers also have connections to their own supply chains. This can result in multiple steps in a supply chain before a product, service, or software is delivered to an organization. At a high level, upstream supply chain risks include disruptions to delivery of products and services and the insertion of malware. Supply chain compromises can enable attackers to bypass all controls and infect critical systems on implicit trust zones. Supply chain disruptions are caused by the same threats that affect all organizations. Threat of intellectual property or trade secrets, business continuity events, counterfeit components inserted somewhere in the supply chain, and malware and other cyber attacks against providers somewhere in the supply chain. Managing supply chain risks requires understanding the risks faced by suppliers and how they are managed. This includes understanding how governance activities are applied or if they are applied, supplier risk management procedures and residual risk, whether or not a supplier has adopted and uses a compliance framework, and if the supplier's security is certified by a third party. Not all of these considerations are needed for all suppliers, and the depth of assessments depends on the associated risk to the customer organization. Another critical risk assessment item is business continuity. How well have suppliers planned for business continuity events, including disasters? Supply chain malware is not just a possible product and service interruption. Malware can also make its way into the supply chain and infect highly protected systems in customer networks. For example, a cyber criminal can insert malware somewhere in a software vendor's supply chain. She could also compromise the vendor's network to compromise software products or their updates. Once this happens, customer businesses are at risk of installing infected software into highly secure network segments. This often occurs because software products are automatically updated at customer sites without any customer review. Firmware updates are also subject to malware infection. At either case, ensuring the software and firmware providers are using reasonable and appropriate controls is the first risk mitigation step. In addition to assessing supplier risk, customer organizations must also manage any supply chain malware that might get through. This begins with identifying critical mission or business processes and the trust zones supporting them. An up-to-date inventory is also needed to understand what applications are installed and may be receiving automatic or user-controlled updates. It's also important to know where those applications reside. An organization must also perform daily reviews of announced vulnerabilities or malware that may have entered the supply chain. This kind of incident must be included in incident response planning and training. Customer organizations must also know the correct IP addresses and URLs used by vendors for updates. Attackers sometimes redirect updates so they can come from malicious servers. Organizations should assume a supply chain attack will be successful. All endpoints involved in updates must be monitored and related business function interruptions included in business continuity planning. Various frameworks exist to assist organizations in managing supply chain risk including SCORE, ISO 28000, ISO 9001, and NIST IR 7622. That's it for this lesson. If you have questions, please ask. And until next time, be careful what you click.
Generate a brief summary highlighting the main points of the transcript.
GenerateGenerate a concise and relevant title for the transcript based on the main themes and content discussed.
GenerateIdentify and highlight the key words or phrases most relevant to the content of the transcript.
GenerateExtract key takeaways from the content of the transcript.
GenerateAnalyze the emotional tone of the transcript to determine whether the sentiment is positive, negative, or neutral.
GenerateWe’re Ready to Help
Call or Book a Meeting Now