"My favorite part of attending ICBA Institutes is connecting with peers from other institutions. I look forward to future events knowing familiar faces will be there, and while the training is always excellent, it’s the networking that keeps me coming back."
-McKenzie Humpal, VP Compliance Officer at First Citizens Bank in Iowa
"Through ICBA, I earned the CCBIA, CBAP, and CCBCO designations, each enhancing my role at different stages of my career. Each designation provided valuable resources and insights that improved my expertise in these areas."
-Michael Hoehn, Assistant Compliance Officer and CRA Officer at First Metro Bank in Muscle Shoals, Alabama.
"The Fraud Seminar was excellent and very informative. I got a lot of resources that will help in our FI. Great tools."
-Donna Franklin, AmeriState Bank, Atoka, Ohio
Displaying slide 1 of 3
Unlimited Webinar Pass
One price for the whole bank
Access more than 80 live webinars and more than 100 on-demand webinars for a full 12 month period— all for one low price.
In recent years, supply chains have become more efficient by
automating many of the tasks and processes that were previously
performed manually. The more that companies’ processes are automated
and the more supply chain partners’ computer systems are connected to
exchange data, the more potential there is for cyberattacks. Every
partner’s network in a supply chain is only as secure as the “weakest
link in the chain”, and the software used by the connected networks is
itself a security concern. In this course, we will explore the risks
and the ways to reduce them.
Learning Objectives:
Describe
the characteristics of the two types of supply chain attacks
Outline practices for protecting your organization against supply
chain attacks
Summarize approaches to evaluating supply chain partners’ security posture
Recall practices to reduce the probability of successful
third-party software attacks