Most organizations today have a complex and huge supplier/partner ecosystem. Many different vendors supply many different products and services. And yet most enterprise third-party security programs still rely on manual, point-in-time, largely subjective assessments to evaluate and manage the security risk of their...
Patch or perish to protect against Meltdown and Spectre attacks, and prepare to keep patching as Intel, AMD and ARM, as well as makers of devices running Apple, Google and Windows operating systems, including Apple iOS and Android smartphones and tablets, continue to refine their fixes.
The role of the CISO is growing in importance, as is the need to have an enterprise-wide IT security strategy that supports the company's mission and goals.
Download this research report and learn why:
The CISO role is becoming more critical in managing enterprise risk;
CISOs must articulate IT security...
U.S. healthcare entities need to keep security top of mind if they use offshore services to handle protected health information, security experts say, pointing to specific steps to take.
From GDPR to the NIST Cybersecurity Framework, vendor risk management is a key component of every new piece of cybersecurity guidance. Yet, security leaders still struggle to inventory and assess their strategic partners. Sam Kassoumeh of SecurityScorecard explores the challenges.
Every new cybersecurity regulation includes at least some emphasis on improving vendor risk management. But what happens when vendors balk at the extra degree of scrutiny required? Moffitt Cancer Center's Dave Summitt describes his risk-based approach to business associates.
The healthcare sector should consider adopting cybersecurity best practices implemented in the financial sector, especially those related to supply chain security and information sharing on cyberattacks, says security expert Greg Garcia.
Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But that's only half the battle. Securing the access pathways is just as critical to protecting your critical systems and data from cyber threats. This session outlines the six steps...
The upcoming enforcement of GDPR puts the spotlight on data governance, but what about the potential impact on vendor risk management? How do you prepare for this new generation of cybersecurity regulations?
Download this eBook that discusses:
Common threads in GDPR, NIST framework and other guidance
Greatest...
The upcoming enforcement of GDPR puts the spotlight on data governance, but what about the potential impact on vendor risk management? Jacob Olcott of BitSight discusses how to prepare for this new generation of cybersecurity regulations.
As data breaches continue to rise, businesses are more at risk than ever. These incidents have demonstrated that organizations are not just at risk through their own networks, but also through their third parties'. This is why it is imperative for businesses to create a vendor risk management (VRM) strategy to...
Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But that's only half the battle. Securing the access pathways is just as critical to protecting critical systems and data from cyber threats. This session outlines the six steps...
As the GDPR enforcement date edges closer, organizations remain unprepared to comply - especially when it comes to vendor risk management. What - beyond contracts - do organizations need?
Download this whitepaper that discusses:
Why organizations remain unprepared for GDPR
What is most misunderstood about vendor...
How well do you know your vendors and the risk they pose? The scope of vendors you need to assess is rising constantly. At the same time, there is more scrutiny than ever on data security and privacy. These factors create greater shared risk where organizations can be held liable for their vendors' actions. To get a...
As the GDPR enforcement date edges closer, organizations remain unprepared to comply, says BitSight's Elizabeth Fischer - especially when it comes to vendor risk management. What - beyond contracts - do organizations need?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.