Skip navigation. Press enter to return to the slide.
Playback Speed
2
1.75
1.5
1.25
Normal
0.75
0.5
0.25
Zoom to fit
Accessible text
Keyboard shortcuts
PREV
NEXT
SUBMIT
Menu
Course Introduction
Course Introduction
Course Welcome locked
Course Welcome
Course Introduction locked
Course Introduction
Course Structure and Objectives locked
Course Structure and Objectives
Importance of Addressing Cybersecurity Supply Chain Risks locked
Importance of Addressing Cybersecurity Supply Chain Risks
Module 1: Impact of Cybersecurity Supply Chain Risks and Relationship to C-SCRM
Module 1: Impact of Cybersecurity Supply Chain Risks and Relationship to C-SCRM
Module 1 Overview locked
Module 1 Overview
Difference Between SCRM and C-SCRM locked
Difference Between SCRM and C-SCRM
C-SCRM Stakeholders locked
C-SCRM Stakeholders
Multilevel Risk Management within C-SCRM locked
Multilevel Risk Management within C-SCRM
Addressing Risks as Part of the C-SCRM Process locked
Addressing Risks as Part of the C-SCRM Process
Benefits of Addressing Cybersecurity Supply Chain Risks locked
Benefits of Addressing Cybersecurity Supply Chain Risks
Knowledge Check #1 locked
Knowledge Check #1
Knowledge Check #2 locked
Knowledge Check #2
Module 2: Identifying and Assessing Cybersecurity Supply Chain Risks
Module 2: Identifying and Assessing Cybersecurity Supply Chain Risks
Module 2 Overview locked
Module 2 Overview
Types of Cybersecurity Supply Chain Risks locked
Types of Cybersecurity Supply Chain Risks
Cybersecurity Supply Chain Risks Encountered on Federal Procurements locked
Cybersecurity Supply Chain Risks Encountered on Federal Procurements
Examples of Cybersecurity Supply Chain Risks locked
Examples of Cybersecurity Supply Chain Risks
Understanding Components of Cybersecurity Risks: Threats locked
Understanding Components of Cybersecurity Risks: Threats
Understanding Components of Cybersecurity Risks: Vulnerability, Likelihood, and Impact locked
Understanding Components of Cybersecurity Risks: Vulnerability, Likelihood, and Impact
Identifying Cybersecurity Supply Chain Risks locked
Identifying Cybersecurity Supply Chain Risks
Examples of Cybersecurity Supply Chain Risks locked
Examples of Cybersecurity Supply Chain Risks
Assessing Cybersecurity Supply Chain Risks locked
Assessing Cybersecurity Supply Chain Risks
Determining Impact for Assessed Risks locked
Determining Impact for Assessed Risks
Cybersecurity Supply Chain Risk Scenario Introduction locked
Cybersecurity Supply Chain Risk Scenario Introduction
Knowledge Check #3 locked
Knowledge Check #3
Knowledge Check #4 locked
Knowledge Check #4
Knowledge Check #5 locked
Knowledge Check #5
Knowledge Check #6 locked
Knowledge Check #6
Knowledge Check #7 locked
Knowledge Check #7
Module 3: Responding to Cybersecurity Supply Chain Risks
Module 3: Responding to Cybersecurity Supply Chain Risks
Module 3 Overview locked
Module 3 Overview
Risk Response Process locked
Risk Response Process
Sharing Substantial Supply Chain Risk Information locked
Sharing Substantial Supply Chain Risk Information
Information Encountered That Could Be Substantial locked
Information Encountered That Could Be Substantial
Impact of Not Sharing Certain Supply Chain Risk Information locked
Impact of Not Sharing Certain Supply Chain Risk Information
C-SCRM Risk Scenario: SCRI locked
C-SCRM Risk Scenario: SCRI
Knowledge Check #8 locked
Knowledge Check #8
Knowledge Check #9 locked
Knowledge Check #9
Knowledge Check #10 locked
Knowledge Check #10
Module 4: Monitoring Cybersecurity Supply Chain Risks
Module 4: Monitoring Cybersecurity Supply Chain Risks
Module 4 Overview locked
Module 4 Overview
Monitoring Cybersecurity Supply Chain Risks locked
Monitoring Cybersecurity Supply Chain Risks
Monitoring Response Actions locked
Monitoring Response Actions
Knowledge Check #11 locked
Knowledge Check #11
Knowledge Check #12 locked
Knowledge Check #12
Summary and Conclusion
Summary and Conclusion
Module 5 Overview locked
Module 5 Overview
Course Summary locked
Course Summary
Conclusion locked
Conclusion
FCS 102 Addressing Cybersecurity Supply Chain Risks
Scenario
Resources
Exit
FCS 102 Addressing Cybersecurity Supply Chain Risks
FCS 102 Addressing Cybersecurity Supply Chain Risks
FCS 102 Addressing Cybersecurity Supply Chain Risks
You are offline. Trying to reconnect...
M
M