Active Defense & Deception , Next-Generation Technologies & Secure Development , Observability

Current State of Affairs: How the Third-Party Cyber Risk Management Industry Went From Reactive to Proactive

Cyberattacks on third parties have been increasing and evolving in the last few years. However, the approach to managing third-party cyber risk has largely stayed the same. As companies rely on third parties to meet their business goals, the need for visibility and insights into their risks grows daily. This requires a shift from a reactive, assessment-focused approach to one with more proactive, data-driven decisions. With more work to be done and fewer people to do it, what’s a CISO to do?

Hear from leading experts in the field to understand:

  • What are the biggest challenges the industry faces
  • What new approaches and technologies are most exciting to them
  • How do they talk to CEOs and Board Members to effectively convey the risk and needs

About the Author

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 34 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.