In third-party cyber risk management – ratings don’t work and questionnaires don’t work.
In third-party cyber risk management – ratings don’t work and questionnaires don’t work. The growing reliance on third-party software and apps, plus a more interconnected supply chain means that organizations need to better manage their vendor risks, and automation can play a key role in the third-party cyber risk management process. The industry is ready […]
Third-Party Cyber Risk Management: Automating Product and Service Specific Assessments
Third Party Cyber Risk Management: Automating Product and Service Specific Assessments Digital transformation and an inter-connected supply chain that leverages third-party software to fulfill business needs is placing a high priority on assessing third parties and their services. Traditional third-party risk assessments and first-generation security ratings products do not provide the level of visibility […]
Four Questions Your Board Will Ask You About Cyber Risk
Four Questions Your Board Will Ask You About Cyber Risk Board members today are increasingly concerned with cybersecurity risks. Recent Gartner research found “Eighty-eight percent of Boards of Directors (BoDs) view cybersecurity as a business risk, as opposed to a technology risk, according to a new survey* from Gartner, Inc.” It’s not surprising given the […]
How Integrated Cyber Risk Management Helps Your Organization
In today’s world, organizations need to have accurate and complete visibility into their entire asset inventory, associated vulnerabilities, and threat landscape, including third-party risks, to understand their complete risk exposure levels to develop a plan for improved cyber risk management outcomes. The problem is, there are a lot of risk management solutions that claim to […]
Cyber Risk Scoring- The FortifyData Scoring Methodology
A cyber risk score is a benchmark score or rating of an organization’s level of risk exposure based on the liabilities related to cybersecurity and IT vulnerabilities. These vulnerabilities can include attack surface (external), internal vulnerabilities (patching, IOCs, port management, etc.), human and environmental risk, vendor/third party risk management processes and more. The cyber risk […]
5 Ways to Protect Your Company Against Ransomware
5 Ways to Protect Your Company Against Ransomware Every day companies are hit with new and mutating ransomware attacks with exponentially increasing financial impacts. According to Forbes, the average cost to recover from a successful ransomware attack doubled from approximately $41,000 per incident to over $84,000. Traditionally, ransomware attacks involved sensitive data encrypted by actors and released […]
Cybersecurity Risk Assessment Basics
About the Author: Anthony Ortega has more than 20 years of experience in cybersecurity, configuration management, systems engineering, and project management. He is currently nearing completion of his doctor of management in information systems technology degree.
Selecting a Third-Party Risk Management System That Fits Your Business
Selecting a Third-Party Risk Management System That Fits Your Business Related Posts
Cyber Attacks: The New Snow Day
3 Ways to Prevent Third-Party Cyber Security Risk
3 Ways to Prevent Third-Party Cyber Security Risk While this pandemic has caused a lot of angst and change in business, there are some lessons that can be learned from how we are trying to stop the spread of COVID-19. What we have learned is that the best way to stop the spread of this […]