You did everything right, but one of your vendors got nailed. Now what? Walk through some of the most common techniques hackers use to compromise supply chain hardware and software, and the things you need to do to protect yourself. #scripts
Mission: Develop a supply chain breach response matrix.
Link: https://portal.galacticscan.com/doc/25/SupplyChainResponseMatrix.xlsx