3rd Party Risk Management , 3rd Party Risk Management , Advanced SOC Operations / CSOC

Third-Party Breaches: Eyeing the Risks

BitSight's Stephen Boyer on the Merits of Continuous Monitoring
Third-Party Breaches: Eyeing the Risks
Stephen Boyer, BitSight Technologies
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight. This article requires a full-access membership (free).
Please login or register to continue reading.



About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 28 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.