8515  Reviews star_rate star_rate star_rate star_rate star_half

Supply Chain Cyber Security Risk Management

This course provides an introduction to fundamental cybersecurity risk management concepts and how they are applied to modern supply chains. Attendees will learn how to identify critical suppliers,...

Read More
$1,950 USD
Duration 2 days
Course Code 2014
Available Formats Classroom, Virtual

Overview

This course provides an introduction to fundamental cybersecurity risk management concepts and how they are applied to modern supply chains. Attendees will learn how to identify critical suppliers, assess risk in third and fourth-party relationships, and identify mitigation strategies. The course covers risks associated with hardware, software, and services acquired from external sources, and attendees will learn strategies for analyzing, treating, and monitoring cyber risk throughout the supply chain.

Skills Gained

  • Identify supply chain components in modern organizations, including hardware, software, and services
  • Inventory critical assets and suppliers, and assess the risks they pose to your organization
  • Understand risk mitigation options, and how to adapt them to address complex risks across the supply chain
  • Implement risk management frameworks and build a supply chain risk management plan
  • Audit and perform oversight of supply chain risk to monitor risk mitigation effectiveness
  • Continue learning and face new challenges with after-course one-on-one instructor coaching

Who Can Benefit

  • Risk managers, looking to extend risk management programs to external third parties, suppliers, and vendors.
  • Security practitioners, tasked with holistic risk management.

Prerequisites

  • To be successful in this course, some experience with risk management and business management is helpful but not required.
  • Basic product development knowledge is beneficial, such as software development lifecycles and integrating components into a final product.

Course Details

Module 1: Risk Management Basics

In this module, you will learn to:

  • Define Risk and determine its likelihood and probability.
  • Assess Risk’s financial, reputational, and revenue impact.
  • Define Threats and Threat Actors.
  • Identify threat modeling approaches.
  • Define Vulnerabilities to networks and organizations.
  • Discuss methods of risk assessment: qualitative vs. quantitative.
  • Identify ways to mature risk assessment processes over time through an Iterative risk assessment.

Exercise 1: Build a risk register for your fictional company.

  • Evaluate Risk Treatment options: Avoid/Mitigate/Accept/Transfer.
  • Determine when are certain options most appropriate?
  • Ask what decision factors must be considered when selecting a risk option?
  • Define what limitations exist in choosing options.

Exercise 2: Document risk treatment plans.

Module 2: Supply Chain Basics

In this module, you will learn about:

  • Define Supply Chain, Vendor, Third/Fourth Party, and key parts of a supply chain.
  • Operational risk and understanding the business impact of prioritizing critical suppliers.
  • Common supply chain risks arising from Hardware (HW), Software SW), and Open-source software (OSS).
  • Inherited/platform risks (e.g., operating system risks that impact an application, underlying modules included in a larger application like Log4j).
  • Risks from services such as key vendors, third parties, etc.
  • Identifying vulnerabilities - What do attackers target?
  • What motivates supply chain attacks, and who are the victims?

Exercise 3: Assess supply chain risks.

Module 3: SCRM Tools & Practices

In this module, you will learn how to:

  • Build an SCRM plan.
  • Leverage existing security and privacy controls in the organization.
  • Identify common framework elements that push compliance to other organizations, such as Business Associates in HIPAA and data subprocessors in GDRP.

Exercise 4: Identify inputs and key outputs of SCRM planning. Document the required process elements needed.

  • Define the purpose of contracts and typical use cases.
  • Define service level requirements, service level agreements (SLAs), and the purpose/typical use cases of each.
  • Define assurance and how the level of risk will impact the level of assurance required.
  • Conduct due diligence at contract initiation and then routinely throughout the service lifetime.
  • Implement due care, such as supplier audits and identifying alternate suppliers.
  • Ensure adequate insurance coverage for third- and fourth-party risks.
  • Consume vendor-supplied audit reports and identify gaps against the organization’s internal compliance requirements.
  • Build an audit methodology and implement the program.
  • Treat previously discussed hardware, software, and service supply chain risks.

Case Studies: SolarWinds, Kaseya, and Target breaches.

Module 4: Compliance Frameworks, SCRM Vendors, and Tools

In this module, you will learn about:

  • Using a compliance framework to build SCRM capability internal to an organization.
  • Requirements to comply with a framework as a vendor to other organizations.
  • CMMC & NIST SP 800-171.
  • CMMI for Acquisition (CMMI-ACQ).
  • SOC 2
  • Identify as a proactive measure; service providers can undergo an audit and have a documented report of compliance available to share with business partners.
  • Discuss various SOC reports (1, 2, 3) and types (I, II).
  • Cloud Security Alliance (CSA), Cloud Controls Matrix (CCM), Consensus Assessment Initiative Questionnaire (CAIQ), and the CSA STAR Registry.

Exercise: Review a sample CAIQ-Lite report or excerpts from a SOC 2 Type II.

  • Vendor Security Alliance (vendorsecurityalliance.org).
  • Vendor security questionnaires.
  • Ongoing risk monitoring/supplier monitoring platforms (Security Scorecard, BitSight. etc.).
  • GRC platforms (ZenGRC, TugBoat Logic, etc.).
|
View Full Schedule

Schedule

4 options available

  • Nov 25, 2025 - Nov 26, 2025 (2 days)
    Herndon, VA | 9:00 AM 4:30 PM EST
    Language English
    Select from 1 options below
    Herndon, VA |9:00 AM 4:30 PM EST
    Herndon, VA | 9:00 AM 4:30 PM EST
    Enroll
    Enroll Add to quote
  • Mar 2, 2026 - Mar 3, 2026 (2 days)
    Virtual | 9:00 AM 4:30 PM EST
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EST
    Virtual | 9:00 AM 4:30 PM EST
    Enroll
    Enroll Add to quote
  • May 28, 2026 - May 29, 2026 (2 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
  • Aug 24, 2026 - Aug 25, 2026 (2 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

I thought the course was informative and the tools to go over the material were very nice.

Exit certified was great as it is very in depth and hands on learning which made it very easy to learn this type of work.

Good Course. We covered a lot of material in a short amount of time. This course had useful labs that built upon each other.

It was very informative and covered all the required materials along with handson labs for practice.

ExitCertified gave a great course on AWS that covered all of the basics in depth with good lab materials.