Watch this video on YouTube
The organization’s information security manager has identified a growing threat of supply chain attacks affecting the company’s critical vendors. What should be the first step in addressing these emerging risks?