3rd Party Risk Management

New Strategies for Third-Party Management

Bitsight's Jay Jacobs on How to Maximize Your Partnerships

Increasingly, regulatory agencies are pressuring organizations to assess and attest to the cybersecurity of their business partners. Jay Jacobs of Bitsight Technologies discusses strategies for third-party management.

See Also: Expanding Beyond Cybersecurity to Take on Digital Trust

In a video interview at RSA Conference 2016, Jacobs discusses:

  • His background in data protection;
  • Successful strategies for third-party management;
  • How to leverage third-party info to improve cybersecurity.

Jacobs is the senior data scientist at BitSight. Previously, he was the lead data analyst on the Verizon Data Breach Investigation Report. Jacobs is the co-author of "Data Driven Security," a book covering data analysis and visualizations for information security, and hosts the Data-Driven Security podcast. He is also a co-founder of the Society of Information Risk Analysts and currently serves on its board of directors.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.