3rd Party Risk Management , Advanced SOC Operations / CSOC , Governance & Risk Management
Third-Party Breaches: Eyeing the Risks
BitSight's Stephen Boyer on the Merits of Continuous Monitoring Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight. This article requires a full-access membership (free).Please login or register to continue reading.