TPRM driven Supply Chain Cybersecurity
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > TPRM driven Supply Chain Cybersecurity: Connecting TPRM and supply chain security for operational resilience
TPRM driven Supply Chain Cybersecurity: Connecting TPRM and supply chain security for operational resilience

TPRM driven Supply Chain Cybersecurity: Connecting TPRM and supply chain security for operational resilience


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design TPRM lifecycle linking vendor risk to cyber -outcomes Map NIST, ISO 27036, DORA, GDPR to audit-ready controls Enforce contracts, SLAs, due diligence across 3rd/4th parties Implement continuous monitoring beyond questionnaires -Develop breach response playbooks with SBOM Book DescriptionModern organizations rely on complex vendor ecosystems, but third-party risk management (TPRM) and cybersecurity often operate in silos. This book shows how to connect vendor risk management with supply chain cybersecurity using a practical, lifecycle-driven approach. You’ll design a program covering onboarding, vendor risk assessment, continuous monitoring, and offboarding. Instead of static questionnaires, you’ll use threat intelligence, security ratings, and real-world signals to strengthen third-party security and improve decisions across procurement, legal, and security teams. The book aligns practices with NIST supply chain risk management (C-SCRM), ISO 27036, DORA compliance, and GDPR, translating them into audit-ready controls and governance. You’ll learn how to embed vendor due diligence into contracts, manage fourth-party risk, and extend security requirements across suppliers. It also covers SBOM (Software Bill of Materials) standards such as SPDX and CycloneDX to improve software supply chain transparency. Finally, you’ll develop vendor breach response playbooks and apply automation and AI-driven risk scoring to scale your program. By the end, you can build a resilient, intelligence-led TPRM capability.What you will learn Build a TPRM lifecycle for supply chain cybersecurity Perform vendor risk assessment and tiering Align with NIST C-SCRM, ISO 27036, and DORA Embed vendor due diligence into contracts and SLAs Identify and manage fourth-party risk exposure Apply SBOM (SPDX, CycloneDX) to supplier security Run vendor breach response for supply chain incidents Use AI and automation to scale vendor risk management Who this book is forThis book is for cybersecurity leaders, TPRM/VRM practitioners, risk managers, and procurement professionals who need a repeatable way to evaluate and monitor vendors and critical suppliers. Compliance teams and in-house counsel working with DORA, GDPR, HIPAA, and related requirements will also benefit. Basic familiarity with security principles and vendor management helps.

Table of Contents:
Table of Contents

  1. The Disconnect — TPRM vs. Cybersecurity in the Supply Chain
  2. The New Attack Surface — A Taxonomy of Supply Chain Risks
  3. The Foundational Framework — A TPRM-Driven Security Lifecycle
  4. The Regulatory Blueprint — Navigating Key Frameworks
  5. The Legal Foundation — Embedding Cyber into Contracts
  6. The Unseen Threat — Managing Fourth-Party Risk
  7. Deep Dive – threat Intelligence, uncovering hidden risks
  8. The Incident Blueprint — Responding to Thirdand Fourth-Party Breaches
  9. Measuring and advancing TPRM maturity
  10. Connecting TPRM and SCM - Due Diligence of Suppliers and understanding threats
  11. Understanding your service provider SBOM - Applying first party SBOM D diligence to all service providers
  12. The Technological Imperative — Leveraging AI and Automation
  13. The Software Ingredient List — SBOM and Software Supply Chain Security
  14. Building an Advanced Program — From Compliance to Resilience


About the Author :
Eric Richardson has had a distinguished technology career in roles from CISO/ to executive to volunteer AP Comp Sci teacher with over 30 years of experience specializing in the critical intersection of Cybersecurity, Artificial Intelligence, and Operational Risk. Currently serving as the Global Leader of Artificial Intelligence and Security Engineering at Cisco, he spearheads corporate-wide standards for secure AI implementation and evaluates complex architectures to ensure robust security controls. His deep technical expertise in AI is evidenced by his authorship of "Prompt Engineering: Hands-on guide to prompt engineering for AI interactions". Eric resides in Washington State with his Wife Stacie and his daughters Katie and Maddie. Eric possesses a Masters in Computer Science with a focus on cybersecurity Engineering as well as a MBA. Filipi Pires is an internationally recognized cybersecurity leader, researcher, and global speaker specializing in adversary emulation, identity security, and offensive security operations. With over 15 years of experience in the cybersecurity industry, he has built a career at the intersection of technical research, product strategy, and community leadership, helping organizations understand, simulate, and defend against real-world cyber threats. He currently serves as Head of Technical Advocacy at SCYTHE, where he leads global initiatives focused on Breach & Attack Simulation (BAS) and Adversarial Emulation & Validation (AEV). In this role, Filipi works closely with enterprises, government organizations, and security teams worldwide to operationalize adversary simulation, validate defensive controls, and mature cyber resilience programs through realistic attack scenarios. Beyond his corporate role, Filipi is the Founder & Investor at CROSS-INTEL, a global cybersecurity consulting and market-expansion firm, and Advisor & Investor at Sherlockeye, an AI-driven OSINT intelligence platform designed to accelerate cyber investigations and threat intelligence operations. He serves as Organizer of BSides Porto, one of Europe's fastest-growing community cybersecurity conferences, and Director of the Red Team Village at DEF CON, one of the most respected offensive security communities in the world. He is also Senior Advisor at Raíces Cyber Academy and Founder of the Red Team Community across Brazil and Latin America, initiatives dedicated to developing the next generation of offensive security professionals. As an international conference speaker, Filipi has delivered technical presentations and research at many of the world's most prestigious cybersecurity events, including multiple editions of Black Hat USA, DEF CON, Black Hat Middle East & Africa, RSA Conference-related events, and numerous BSides conferences worldwide. His talks focus on identity-centric attack paths, cloud privilege escalation, supply-chain compromise, breach simulation, and real adversary tradecraft. He has been recognized among the Top 3% Most Active Security Speakers globally, reflecting both the volume and impact of his contributions to the industry. His industry recognitions include AWS Community Builder and Snyk Ambassador. He is also known globally as an advocate for hacking through his long-standing initiative “Hacking is NOT a Crime,” promoting responsible research, education, and collaboration across the cybersecurity ecosystem. Through his work spanning industry, research, education, and community leadership, Filipi Pires continues to advance adversary simulation practices, identity-focused security, and the global maturation of offensive cybersecurity capabilities.


Best Sellers


Product Details
  • ISBN-13: 9781806708116
  • Publisher: Packt Publishing Limited
  • Publisher Imprint: Packt Publishing Limited
  • Height: 235 mm
  • Sub Title: Connecting TPRM and supply chain security for operational resilience
  • ISBN-10: 1806708116
  • Publisher Date: 26 May 2026
  • Binding: Paperback
  • Language: English
  • Width: 191 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
TPRM driven Supply Chain Cybersecurity: Connecting TPRM and supply chain security for operational resilience
Packt Publishing Limited -
TPRM driven Supply Chain Cybersecurity: Connecting TPRM and supply chain security for operational resilience
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

TPRM driven Supply Chain Cybersecurity: Connecting TPRM and supply chain security for operational resilience

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    Hello, User