The rising cost of pharmaceuticals is an unfortunate reality that can render patients unable to afford medication. This struggle was evident to Dr. Michael Rae who created the Rx Savings Solutions app that helps consumers save on prescription costs. Dr. Rae is a medical expert, but since technology is not his forte,...
Intelligence agencies sometimes seek out and develop exploits for the very technology that their nation's organizations rely on to secure their data. In an interview, cybersecurity expert Alan Woodward offers insights on how information security professionals should respond.
The Equation Group leak revealed a zero-day flaw in Cisco's firewall software - a patch is being prepped - as well as a vulnerability in Fortinet's software that's since been patched. Has the U.S. government long known about the flaws?
Traditional third party risk management solutions and techniques are no longer effective. Organizations must move beyond trust based exercises and canned IT infrastructure evidence to evaluate areas of compromise. There are several discrete security areas that must be continuously evaluated for vendors, partners, and...
Looking to streamline your vendor risk management process? Take a look at these tools and techniques.
Organizations today aren't just single entities - they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more...
Governing and managing third-party relationships continues to be more complex and significant given all of the new regulations, technologies and standards. Financial organizations want to protect themselves and their clients from third-party threats, but their current approaches are leaving too many gaps. What if...
Effective breach response in today's fast-paced and threat-filled environment means juggling several priorities at once, with organizations needing to work well with a pool of trusted forensic advisors, public relations professionals and law enforcement, just to name a few. In this session, Jim Harvey, founder and...
Outsourcing is nothing new. Industries have been embracing service providers for functions they either couldn't or didn't want to perform for years. This necessitated integrating business systems and providing these third party vendors with access to corporate networks and computer systems. The risk was generally...
Network security grows more complex every year with enterprises launching bolder applications with broader reach, facing more threats, adopting new devices, and implementing new security tools to protect it all. With so much to oversee and protect, keeping IT security simple, manageable, and effective (KISSME) begins,...
Behind many of the biggest breaches is a third-party intrusion. And yet far too few organizations have an effective third-party risk management program in place, says Norman Menz III, co-founder and CTO of Prevalent. How must they address this gap?
In a video interview at RSA Conference 2016, Menz...
Behind many of the biggest breaches is a third-party intrusion. And yet far too few organizations have an effective third-party risk management program in place, says Norman Menz III, co-founder and CTO of Prevalent, in this video interview. How must they address this gap?
Cybersecurity in the financial services industry is rapidly evolving.
Do you know how to stay ahead of the curve?
The financial sector has been a pioneer for vendor risk management (VRM) best practices for a
long time. Yet cybersecurity practices are continuing to evolve, and regulatory bodies are
focusing more on...
Increasingly, regulatory agencies are pressuring organizations to assess and attest to the cybersecurity of their business partners. In this video interview, Jay Jacobs of Bitsight Technologies discusses strategies for third-party management.
Choosing the right MSSP partner is an important decision in an organization's overall security. Writing an RFP is the first step in the process to finding the right fit for the organization. By using this document, an organization should be able to choose an MSSP and write a tailored RFP/RFI that will help make the...
Many recent breaches have exploited security weaknesses in third party vendors and suppliers
to attack organizations across all industries. In this SANS What Works Case Study, Chris
Porter, Deputy CISO at Fannie Mae details:
His experience using BitSight Security Ratings to assess the cybersecurity level of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.