Panelists will discuss third-party risks at SECURITY 500 Conference

Panelists will discuss third-party risks at SECURITY 500 Conference

At the 2024 SECURITY 500 Conference panel “The Weakest Link: Strengthening Security in Third-Party Relationships,” security leaders will discuss the risks associated with third-party relationships and offer strategies for managing them. The panel will discuss how as organizations come to rely more heavily on third-party vendors, the greater these risks will become. Considering the potential for third-parties to become an enterprise’s weakest link, panelists will provide advice for managing third-party vendors and associated risks.  The…

Read More

Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

Third-party supply chain risk is a key concern from Australian cyber security professionals. With enterprises typically relying on an expanding network of interconnected systems — often suppliers of suppliers — it is becoming difficult to maintain data control to ensure security. Tesserent CEO Kurt Hansen said security professionals need strong governance and processes to ensure they are aware of all business activities. He added they need to be more conscious of how geopolitical tensions could…

Read More

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Streamlining third-party risk management for enhanced resilience

Streamlining third-party risk management for enhanced resilience

Streamlining third-party risk management for enhanced resilience | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Organizations concerned about enterprise security from unsafe VPNs

Organizations concerned about enterprise security from unsafe VPNs

Organizations concerned about enterprise security from unsafe VPNs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The importance of security hygiene

The importance of security hygiene

The importance of security hygiene | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Getting a Tighter Grip on Supply Chain Security Risk

Getting a Tighter Grip on Supply Chain Security Risk

3rd Party Risk Management , Events , Governance & Risk Management Proofpoint CEO Ashan Willy on Ways to Identify Third-Party Compromises Michael Novinson (MichaelNovinson) • May 7, 2023     Ashan Willy, CEO, Proofpoint Some of the most sophisticated cyberattacks are being targeted at third-party suppliers in an effort to affect their critical clients, said Ashan Willy, CEO of Proofpoint. But often client organizations affected by these attacks do not even realize…

Read More

With a recession looming, security leaders should plan for the impact

With a recession looming, security leaders should plan for the impact

With a recession looming, security leaders should plan for the impact | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Third-party risk challenges presented by the Great Resignation

Third-party risk challenges presented by the Great Resignation

Third-party risk challenges presented by the Great Resignation | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

6 areas to watch in the Software Bill of Materials evolution

6 areas to watch in the Software Bill of Materials evolution

6 areas to watch in the Software Bill of Materials evolution | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 2 3