{"id":17090,"date":"2021-01-27T19:38:18","date_gmt":"2021-01-27T19:38:18","guid":{"rendered":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management-3\/"},"modified":"2023-05-31T10:20:59","modified_gmt":"2023-05-31T10:20:59","slug":"ciso-playbook-supply-chain-cyber-risk-management","status":"publish","type":"page","link":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/","title":{"rendered":"CISO Playbook: Supply Chain Cyber Risk Management"},"content":{"rendered":"

CISO Playbook:<\/p>\n

Supply Chain Cyber<\/span> Risk Management<\/span><\/span><\/strong><\/h1>\n

Building cyber resilience into your supply chain<\/p>\n

Throughout this playbook, you will find practical guidelines to identify and implement effective cyber governance strategies over third parties or business partners.<\/p>\n

Enter your details below for free membership of the Cyber Leadership Institute to download the playbook.<\/p>\n

If you’re already a member, click here<\/a> to log in or just download the PDF<\/a>.<\/p>\n

\"\"<\/span>About the AuthorPhillimon Zongo<\/strong><\/p>\n

Phil is an international keynote speaker, multi-award winning virtual CISO and bestselling author of The Five Anchors of Cyber Resilience<\/a><\/span>, a practical cyber strategy book for senior business leaders. He is an official member of Forbes Business Council, an Invitation-Only Global Community for Successful Business Owners and Leaders. He was named one of 2020\u2019s Top 100 Most Influential People of African Descent (New York USA), as well as 2017 winner of ISACA International\u2019s Best Article Award (Chicago, USA). His views have been featured by Forbes, CISCO, NZ Business Herald, Financial Standard, SAP, etc., and named as one of the Top 7 Global Cyber Security Leaders in 2023 by the Security Magazine and ISACA.<\/strong><\/p>\n

Related content:<\/strong>\"\"<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

CISO Playbook: Supply Chain Cyber Risk Management Building cyber resilience into your supply chain Throughout this playbook, you will find […]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"acf":[],"yoast_head":"\nCISO Playbook: Supply Chain Cyber Risk Management<\/title>\n<meta name=\"description\" content=\"Supply Chain Cyber Risk Management Playbook offers guidelines to identify & implement cyber governance strategies for cyber resilience in your supply chain\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO Playbook: Supply Chain Cyber Risk Management\" \/>\n<meta property=\"og:description\" content=\"Building cyber resilience into your supply chain. Throughout this playbook, you will find practical guidelines to identify and implement effective cyber governance strategies over third parties or business partners.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Leadership Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/cyberleadershipinstitute\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T10:20:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Playbook-SCCRM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CISO Playbook: Supply Chain Cyber Risk Management\" \/>\n<meta name=\"twitter:description\" content=\"CISO Playbook:Supply Chain Cyber Risk ManagementBuilding cyber resilience into your supply chainThroughout this playbook, you will find practical\" \/>\n<meta name=\"twitter:site\" content=\"@C_L_Institute\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/\",\"name\":\"CISO Playbook: Supply Chain Cyber Risk Management\",\"isPartOf\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg\",\"datePublished\":\"2021-01-27T19:38:18+00:00\",\"dateModified\":\"2023-05-31T10:20:59+00:00\",\"description\":\"Supply Chain Cyber Risk Management Playbook offers guidelines to identify & implement cyber governance strategies for cyber resilience in your supply chain\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#primaryimage\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg\",\"width\":300,\"height\":287},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberleadershipinstitute.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO Playbook: Supply Chain Cyber Risk Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"name\":\"Cyber Leadership Institute\",\"description\":\"Know You're Ready\",\"publisher\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\",\"name\":\"Cyber Leadership Institute\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"width\":512,\"height\":512,\"caption\":\"Cyber Leadership Institute\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/cyberleadershipinstitute\",\"https:\/\/x.com\/C_L_Institute\",\"https:\/\/www.instagram.com\/cyber_leadership_institute\/\",\"https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO Playbook: Supply Chain Cyber Risk Management","description":"Supply Chain Cyber Risk Management Playbook offers guidelines to identify & implement cyber governance strategies for cyber resilience in your supply chain","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"CISO Playbook: Supply Chain Cyber Risk Management","og_description":"Building cyber resilience into your supply chain. Throughout this playbook, you will find practical guidelines to identify and implement effective cyber governance strategies over third parties or business partners.","og_url":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/","og_site_name":"Cyber Leadership Institute","article_publisher":"https:\/\/facebook.com\/cyberleadershipinstitute","article_modified_time":"2023-05-31T10:20:59+00:00","og_image":[{"width":620,"height":351,"url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Playbook-SCCRM.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"CISO Playbook: Supply Chain Cyber Risk Management","twitter_description":"CISO Playbook:Supply Chain Cyber Risk ManagementBuilding cyber resilience into your supply chainThroughout this playbook, you will find practical","twitter_site":"@C_L_Institute","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/","url":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/","name":"CISO Playbook: Supply Chain Cyber Risk Management","isPartOf":{"@id":"https:\/\/cyberleadershipinstitute.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg","datePublished":"2021-01-27T19:38:18+00:00","dateModified":"2023-05-31T10:20:59+00:00","description":"Supply Chain Cyber Risk Management Playbook offers guidelines to identify & implement cyber governance strategies for cyber resilience in your supply chain","breadcrumb":{"@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#primaryimage","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/PhilZongo.jpg","width":300,"height":287},{"@type":"BreadcrumbList","@id":"https:\/\/cyberleadershipinstitute.com\/ciso-playbook-supply-chain-cyber-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberleadershipinstitute.com\/"},{"@type":"ListItem","position":2,"name":"CISO Playbook: Supply Chain Cyber Risk Management"}]},{"@type":"WebSite","@id":"https:\/\/cyberleadershipinstitute.com\/#website","url":"https:\/\/cyberleadershipinstitute.com\/","name":"Cyber Leadership Institute","description":"Know You're Ready","publisher":{"@id":"https:\/\/cyberleadershipinstitute.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberleadershipinstitute.com\/#organization","name":"Cyber Leadership Institute","url":"https:\/\/cyberleadershipinstitute.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","width":512,"height":512,"caption":"Cyber Leadership Institute"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/cyberleadershipinstitute","https:\/\/x.com\/C_L_Institute","https:\/\/www.instagram.com\/cyber_leadership_institute\/","https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"authorship-box-avatar":false,"authorship-box-related":false},"uagb_author_info":{"display_name":"anirtac arim","author_link":"https:\/\/cyberleadershipinstitute.com\/author\/cat\/"},"uagb_comment_info":0,"uagb_excerpt":"CISO Playbook: Supply Chain Cyber Risk Management Building cyber resilience into your supply chain Throughout this playbook, you will find […]","_links":{"self":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17090"}],"collection":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/comments?post=17090"}],"version-history":[{"count":29,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17090\/revisions"}],"predecessor-version":[{"id":38061,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/17090\/revisions\/38061"}],"wp:attachment":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/media?parent=17090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}