At its core, cybersecurity is about applying scarce resources to the highest risk. And nothing quite puts that tenet to the test like the COVID-19 pandemic. Jim Routh, CISO of MassMutual, discusses the challenges of managing a remote workforce and third-party relationships during this crisis.
While responding to the COVID-19 crisis, supply chain risks can be better managed if an organization continues to rely on its longtime vendors, says Daniel Bowden, CISO at Sentara Healthcare, who offers insights on third-party security risk management in the current environment.
An emerging technology, Vvendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.
As automobile manufacturers and others rush to shift to production of ventilators and other medical equipment and supplies to help fight the COVID-19 pandemic, they must take steps to ensure security, privacy and safety risks are addressed, says technology attorney Steven Teppler.
Traditionally, security teams look to penetration tests and red teaming to test and build confidence in their security programs. These options are often costly, time-consuming, and limited in scope. There is a better way to gain confidence in security models: continuous attack simulations, which automate adversary...
Want to maximize your digital transformation project success and impact? Start by ensuring that you correctly explain risk to stakeholders, as well as continually benchmark your organization's risk management maturity, says ServiceNow's Barbara Kay.
In this brand new research report, "Internet Risk Surface in the Financial Sector," RiskRecon and the Cyentia Institute analyzed how organizations in the finance sector are managing digital risk. We set out to determine what the key dimensions of risk are that influence exposure, how that compares to other industries...
Risk management is the foundation upon which many institutions are built, but many important questions remain: What are the key dimensions of internet risk surface? How does that surface compare to other sectors? Which specific industries appear to be managing that risk better than others?
RiskRecon and the...
You know you need a third-party cyber risk management (TPCRM) solution. Learn how to assess your current program maturity, key considerations for selecting technology, and how to make your case to the c-suite.
Download this guide to better understand the options for TPCRM, whether you are looking to advance your...
Increased business reliance on vendors and third parties means attack surfaces are growing. With greater attack surfaces comes greater risk, and thus the need for an effective third-party cyber risk management program.
Download this guide to learn how to get buy-in from key stakeholders, common roadblocks, and more.
Hacking incidents involving email appear to be the most common type of major health data breach being reported to federal regulators so far in 2020. But the largest breach added to the tally involved a type of incident rarely seen in recent years: the theft of an unencrypted laptop.