3rd Party Risk Management , Fraud Management & Cybercrime , Fraud Risk Management

World Health Organization CISO on Supply Chain Risk

Flavio Aggio: SolarWinds-Type Attacks Are Far More Than a 'Patching Problem'
Flavio Aggio, CISO, World Health Organization

Flavio Aggio, CISO of the World Health Organization, has had a long career across many sectors. He understands supply chain risk, and he sees the SolarWinds hack as "resumption of a very old attack - in new packaging." He offers insights on mitigating this and other cybersecurity risks.

See Also: Live Webinar | All the Ways the Internet is Surveilling You

Aggio will be a featured speaker at Information Security Media Group's Virtual Cybersecurity Summit: Healthcare, slated for March 16-17.

In this video interview with ISMG, Aggio discusses:

  • Why the SolarWinds supply chain incident is "an old attack in new packaging";
  • Seven cybersecurity points that need to be immediately addressed;
  • Three tips for security leaders to protect themselves and their families.

As CISO, Aggio is responsible for information security and cybersecurity at the World Health Organization. He has more than 30 years of experience in specialized chemical manufacturing, semiconductor, consumer product, government and international industries. He formerly served as CTO at the City and County of San Francisco, where he developed technology solutions to modernize and protect the city. Before that, he held technical leadership positions in enterprise architecture, project management, telecommunications and IT operations at Unisys, ASML, Dow Chemical and Rohm & Haas.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.