Third-party risk management (TPRM) is more important now than ever. The practice extends far beyond "checking the box" for compliance. And while compliance is a critical component, recent market turbulence has organizations prioritizing business continuity, financial due diligence, and business resilience. How can you...
Managing risk complexities posed by multiple third-party vendors will always be a challenge. CISOs, security and compliance professionals are making third-party risk management a priority like never before due to remote working, supply chain complexity, cloud storage, phishing and ransomware attacks, and regulations...
For an upcoming virtual roundtable, Alex Laurie of ForgeRock discusses the importance of digital identity management, the need for organizations to quickly and accurately register people, comply with privacy regulations and define and manage the level of risk involved.
'Risk acceptance' was the operative term as organizations quickly deployed remote workforces in response to the global crisis. But now, as this deployment becomes a permanent option, enterprises need to take a longer view toward identity, cloud, and the attack surface.
Download this exclusive eBook on securing the...
Bobby Ford, CISO of Unilever, a multinational consumer goods firm, says the shift to a work-from-home environment requires an intensified focus on email security as well as identity and access management.
The latest edition of the ISMG Security Report sizes up progress made so far on identity management and the work yet to be done. Also featured: how security concerns are holding back IoT projects and the privacy issues raised by recording videoconferences.
Fraudsters are using fake VPN update alerts to target remote workers in an effort to steal their Microsoft Office 365 credentials, according to the security firm Abnormal Security.
Organizations have undergone rapid network transformation in the last two months, and though the change has now stabilized into a new normal, new security concerns that affect an organization's overall risk often have not been addressed. Now that the dust has settled, many leaders are examining the transformation and...
As organizations assess the long-term implications of a remote workforce, it's clear that SD-WAN technology will play an increasingly important role, says Renee Tarun of Fortinet, who discusses the way forward.
The world has experienced an unprecedented business disruption that instantly created the largest remote workforce - and largest attack surface - in history. How do you validate users and access in this new dynamic workforce? RSA's Steve Schlarman and Ben Smith preview an upcoming series of virtual roundtables.
Some crises require that companies, organizations, and government agencies enable remote workers quickly and efficiently to ensure operational and business continuity. Such efforts to enable a remote workforce are challenging for many reasons.
Download this guide on establishing a work from home model and learn...
In the aftermath of the COVID-19 pandemic, the abruptness and unprecedented scale at which organizations have advised employees to work remotely, has given rise to complex and widespread IT security challenges; bringing into sharp focus the lack of preparation to meet such contingencies, and the pervasive...
By now, most IT teams have a handle on work-from-home and many are looking ahead to the days when offices will re-open, and users will go back to work. For some, getting the office back up and running is as simple as turning everything back on, but for others, there's lots of work to be done.
In this webinar,...
As a result of the COVID-19 pandemic, work-from-home employees have rushed to adopt videoconferencing tools. But Kroll's Alan Brill warns that sound security and privacy practices - backed by legal, risk management and HR teams - too often lag. Here are his top concerns and tips on how to address them.
Ransomware, wire transfer fraud, destructive attacks: In recent months, the financial sector has seen these and other online attacks surge by 238% as criminals continue to exploit the pandemic, warns Tom Kellermann of VMware Carbon Black, who shares findings from his firm's third "Modern Bank Heists" report.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.