The security of your vendor's entire enterprise impacts you, and that is why third-party security risk matters. The third-party space is currently being transformed, which will change how you must prioritize risk.
Download this white paper and learn:
Principles for fair and accurate security ratings;
The true...
This is the definitive study of third-party security risk management practices. Based on in-depth interviews of risk executives from 30 domestic and global firms, it reveals the real-world capabilities and practices employed to manage third-party security risk.
Compare your own program with the Playbook data about...
Your executives have adopted a service-provider-first strategy, outsourcing system hosting and services operations on a large scale. As systems and services move outside the organization, related information assets move with it. While you can outsource your systems and services, you cannot outsource your risk....
Forrester recently surveyed 100 IT and IT security executives to understand the approaches and challenges your peers experience with user authentication and access management.
Curious to hear how you compare to your peers? Read the Forrester Report.
Remote access is important and growing, but how secure is it? More than 300 IT professionals were surveyed to gain insight into the specific threats and challenges faced by providing access to employees and third parties.
Download this report to learn about:
The complexity faced in implementing remote access
What...
Traditional access models are unable to keep up with the pace of change. A new model is needed to manage complexity and live up to end-user expectations.
Download this whitepaper to learn about a simpler, more secure way to manage remote access, including how IT administrators can:
Provide secure access to...
The apps financial services organizations depend on to fuel productivity, innovation and success are truly unique. But how is the industry evolving to adopt new technology that can offer the reliability, security and compliance it requires?
Download Okta's annual Businesses @ Work report which provides an in-depth...
CISOs increasingly are summoned to present to their Boards of Directors. But too often these presentations fail to frame the right topics with the right metrics.
Download this eBook on addressing the Board and learn about:
Common challenges security and risk teams face when reporting to the Board;
Key areas of...
What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement began? Don't panic, says cybersecurity expert Brian Honan, but do be pursuing a data privacy transparency and accountability action plan.
Leading the latest edition of the ISMG Security Report: Reports on the impact enforcement of the EU's General Data Protection Regulation, which began Friday, will have on the healthcare and banking sectors. Plus an assessment of GDPR compliance issues in Australia, which offer lessons to others worldwide.
There are massive amounts of vulnerabilities that companies deal with on an ongoing basis - not everything is lost though. Organizations that use unpatched software face a race against the clock, with attackers regularly beginning to hammer new vulnerabilities just hours after new fixes or security alerts get released...
Look at information security through the lens of business risk, and you'll begin to make decisions about security in light of their impact on the business. With security threats emerging faster than ever, what information is most important to protect? What happens if it's not protected? What strategic business...
We all know that May 25 was the enforcement deadline for Europe's General Data Protection Regulation. But what impact will General Data Protection Regulation have on cybersecurity programs?
GDPR, or the "Y2K" of our era, is part of a larger conversation that's been catalyzed by a lot of the recent news around...
Not long ago, Sam Kassoumeh of Security Scorecard has to explain the concept of cybersecurity ratings. Now he sees the practice being used throughout enterprises for other, evolving business cases.
Managing third-party risks is more critical than ever, says Tom Turner of BitSight Technologies, who discusses the urgency of communicating that to the board.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.