You already have some sort of third party security program in place - perhaps you've built a security questionnaire based on internal policies or an industry standard such as ISO or NIST. You may have even "right-sized" your questionnaire specifically for different types of supplier relationships and developed a few...
Your vendors often handle your most sensitive data. This presents new challenges as third-party risk, security, privacy, legal and IT teams struggle to vet and manage the vendors they rely on most. We'll discuss emerging vendor management trends and breakdown how risk exchanges are key to more efficient business...
Security teams are dealing with more vulnerabilities than they can handle. Spreading these limited resources too thin can quickly lead to inefficiency and burnout. Don't waste precious time re-mediating vulnerabilities that pose little to no risk.
With risk-based vulnerability management, you'll know exactly which...
Written by SANS experts, Practical Industrial Control System Cybersecurity: IT and OT Have Converged explores key issues arising when IT and OT are combined into cyber-physical systems, where risks must be continually identified and managed.
Download the whitepaper to learn how to answer these key questions:
Why...
One of the largest fines to date for violating the EU's General Data Protection Regulation has been announced by Germany's federal privacy and data protection watchdog, the BfDI, against 1 & 1 Telecommunications, in part for inadequate authentication mechanisms. The company plans to appeal.
Your best bet to avoiding the potentially exorbitant costs of a vendor hack is to not have one in the first place. A solid vendor risk management program, backed up by technology, policies, and procedures is the best protection. Good review and audit processes can catch any vendor-related problems before they become...
In today's digital environment, protecting sensitive information and sales transaction data is of critical importance. Tim Horton of First Data explains the concept of "devaluing" data so it's worthless in the event of a breach.
With the goal of becoming an international university XJTLU needed to ensure that their website was high performing and available for users anywhere in the world. However, with infrastructure focused on campus, access to XJTLU's site was intermittent and slow for off campus users. This poor performance was magnified...
The National Cyber Security Center, the U.K.'s national computer emergency response team, investigated 658 serious cybersecurity incidents in a 12-month period and supported nearly 900 victim organizations - most of whom learned they had fallen victim after being alerted by the center.
Great Rail Journeys is the UK's leading seller of holidays by rail, making it easy for customers to browse and book trips online. But as they were actively expanding their customer base internationally to North America, with the ultimate goal of delivering services globally, they recognized a few technical challenges,...
In today's shifting security and regulatory environment, ongoing third-party monitoring is crucial to compliance success. But how do you keep up with a constantly changing and growing list of vendors?
This session will outline the keys to third-party risk management success through a modern approach to monitoring...
Security by design, as its name suggests, is exactly that kind of a proactive approach. By ensuring that system components have been securely designed in the first instance, and that the system components will operate securely together, system architects can go a long way toward providing security and privacy by...
Cybersecurity for Dummies eBook delivers a fast, easy read that describes what everyone needs to know to defend themselves and their organizations against cyber attacks - including simple steps everyone can take to protect themselves at work and at home. It empowers your employees to understand and recognize the most...
Learn how the pro's create and optimize efficient, scalable third-party cyber risk management programs - and how you can, too.
Implementing an efficient, effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem by tracking, avoiding, and minimizing the...
The unfortunate reality is that your data security strategy will most likely stall or fail. Unstructured data is getting out of view and control in every organization across verticals. Policy management plays a critical role in the development of data security initiatives, but also requires a coordinated data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.