Roundtable 6: The SolarWinds and FireEye compromise demonstrated the devastating effectiveness of a supply chain cybersecurity attack. How should CISOs, cybersecurity organizations and application delivery professionals prepare? Will suppliers be required to disclose or validate supply chain security measures?