Episode 10 — Engineer vendor and supply chain privacy controls that hold up under pressure (Domain 1B-2 Vendor and Supply Chain Management)

This episode teaches vendor and supply chain privacy management from an engineering perspective, focusing on the controls and evidence CDPSE expects you to evaluate under real-world constraints. You’ll cover how to scope vendor access, define data handling requirements, and translate privacy obligations into contracts, SLAs, technical controls, and ongoing monitoring that actually detects drift. We’ll work through scenarios like SaaS analytics, outsourced support, cloud sub-processors, and data sharing partnerships, highlighting common failure modes such as uncontrolled onward transfer, weak breach notification terms, and missing deletion guarantees. You’ll also learn how exam questions reward answers that combine due diligence with operational verification, including access reviews, audit rights, logging expectations, and clear exit and transition plans. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 10 — Engineer vendor and supply chain privacy controls that hold up under pressure (Domain 1B-2 Vendor and Supply Chain Management)
Broadcast by