As the GDPR enforcement date edges closer, organizations remain unprepared to comply, says BitSight's Elizabeth Fischer - especially when it comes to vendor risk management. What - beyond contracts - do organizations need?
There are many reasons why healthcare companies are far more concerned about the security posture of their vendors�and the maturity of their vendor risk management (VRM) program�than ever before. Medical data and personal patient information is migrating to the digital world, cyber attacks are continuing to grow in...
Today, organizations are focused heavily on core competencies and keys to success. This-coupled with the rapid growth of software as a service (SaaS)-has led to increased outsourcing of certain business functions to vendors who can perform these functions better, faster, or cheaper.
Download this whitepaper that...
With the growth in the number and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of the most significant risks that organizations face.
Measuring and managing security risk levels continues to be a difficult task. Faced with a constant stream of evolving...
While your current Vendor Risk Management (VRM) program may have areas of strength, there is most certainly room for improvement. Vendor Risk Management programs are a significant driver of both internal and external advisor time and are limited in scale -- they will also continue to grow in importance as your...
Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But that's only half the battle. Securing the access pathways is just as critical to protecting your critical systems and data from cyberthreats. This session outlines the six steps...
A lot of the risk to an organization's reputation is caught up in how an organization is able to respond to a cyber attack. Over the years, organizations have suffered serious consequences from a cyber attack. They've lost a lot of data, and the public response to those incidents has really further damaged the...
Embrace an approach that fully automates the delivery and management of infrastructure and application components, including network and security services to accelerate IT service delivery, and respond faster to the dynamic needs of a digital business. This practical guide shows you how.
VMware and Intel enable IT...
You know the risk of a cyber incident when it comes to finances or operations. But what happens if your company's reputation suffers?
In today's cyber risk environment-especially with the rapid spread of information over social media-companies are becoming more and more concerned about how a cyber incident could...
Traditional third party risk management solutions and techniques are no longer effective. Organizations must move beyond trust based exercises and canned IT infrastructure evidence to evaluate areas of compromise. There are several discrete security areas that must be continuously evaluated for vendors, partners, and...
Effective breach response in today's fast-paced and threat-filled environment means juggling several priorities at once, with organizations needing to work well with a pool of trusted forensic advisors, public relations professionals and law enforcement, just to name a few. In this session, Jim Harvey, founder and...
BitSight Technologies is out with its annual Industry Benchmark Report, and cybersecurity ratings are low for the energy and utilities industry. BitSight's Mike Woodward shares insights for all sectors.
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
Manufacturers of a wide variety of devices that link to the Internet can improve security by turning to processes IT has used for nearly a generation, says Tony Sager of the Council on Cybersecurity.
Big data is a hot item on every banking institution's security agenda, says Gartner analyst Avivah Litan. Here she explains why mid-sized institutions are in the best position to implement new technology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.